Loading HuntDB...

CVE-2025-53770

CRITICAL
Published 2025-07-20T01:06:33.607Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-53770. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
9.8
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:W/RC:C
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
Not Available
Attack Complexity
Not Available
Privileges Required
Not Available
User Interaction
Not Available
Scope
Not Available

Impact Metrics

Confidentiality
Not Available
Integrity
Not Available
Availability
Not Available

Description

No description available

Available Exploits

No exploits available for this CVE.

Related News

Imperva Customers Protected Against Critical “ToolShell” Zero‑Day in Microsoft SharePoint

A critical zero-day vulnerability in Microsoft SharePoint, tracked as CVE-2025-53770, is under active exploitation in the wild. The vulnerability, with a CVSS score of 9.8, impacts on-premises SharePoint Server 2016, 2019, and Subscription Edition, and allows…

Imperva.com 2025-07-23 21:17
Analyzing Sharepoint Exploits (CVE-2025-53770, CVE-2025-53771), (Wed, Jul 23rd)

A few days after the exploit originally became widely known, there are now many different SharePoint exploit attempts in circulation. We do see some scans by researchers to identify vulnerable systems (or to scan for common artifacts of compromise), and a few…

Sans.edu 2025-07-23 19:36
Metasploit Module Released for Actively Exploited Microsoft SharePoint Flaw CVE-2025-53770

The post Metasploit Module Released for Actively Exploited Microsoft SharePoint Flaw CVE-2025-53770 appeared first on Daily CyberSecurity.

SecurityOnline.info 2025-07-23 15:32
Cloudflare protects against critical SharePoint vulnerability, CVE-2025-53770

Microsoft disclosed two critical vulnerabilities, CVE-2025-53771 and CVE-2025-53770, that are exploited to attack SharePoint servers. Possession of these cryptographic machine keys allows an attacker to forge authentication tokens and maintain access even if …

Cloudflare.com 2025-07-22 16:30
Google, Microsoft say Chinese hackers are exploiting SharePoint zero-day

Security researchers at Google and Microsoft say they have evidence that hackers backed by China are exploiting a zero-day bug in Microsoft SharePoint, as companies around the world scramble to patch the flaw. The bug, known officially as CVE-2025-53770 and d…

Biztoc.com 2025-07-22 16:14

Affected Products

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Overdue

Due Date

July 21, 2025

Added to KEV

July 20, 2025

Required Action

CISA recommends configuring AMSI integration in SharePoint and deploying Defender AV on all SharePoint servers. If AMSI cannot be enabled, CISA recommends disconnecting affected products that are public-facing on the internet from service until official mitigations are available. Once mitigations are provided, apply them according to CISA and vendor instructions. Follow the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.

Affected Product

Vendor/Project: Microsoft
Product: SharePoint

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.07.20 Released: July 20, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed CRITICAL

GHSA-xcrc-8vqv-vc8r

Advisory Details

Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.

CVSS Scoring

CVSS Score

9.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: July 20, 2025, Modified: July 22, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

48 posts
Reddit 3 hours, 28 minutes ago
thorondrol

Help: Issues after Patching for CVE-2025-53770 Hey guys. I'm super new to SharePoint, I'm a developer that does nothing related to Ms SharePoint but as we now have a smaller IT workforce at the company I work for, I was assigned as owner of these servers on Monday (worst possible …

Reddit 5 hours, 24 minutes ago
Queasy-Frosting-5887
Exploit

SharePoint “ToolShell” zero day If SharePoint “ToolShell” zero day is ruining your day, we've got you covered. CVE-2025-53770 and CVE-2025-53771 don't have to get in the way of your detection and hunting activities.

Also mentions: CVE-2025-53771
2
2.0
View Original High Risk
Reddit 8 hours, 12 minutes ago
RecastSoftware

[New Builder Templates] Address Endpoint CVE-2025-47981 & SharePoint CVE-2025-53770 This week brought serious new security vulnerabilities, including one affecting general endpoint security (CVE-2025-47981) and another specifically targeting SharePoint servers (CVE-2025-53770). Both are already being actively exploited. To help our community respond quickly, we've released two new Recast Builder automation templates …

Also mentions: CVE-2025-47981
Reddit 10 hours, 6 minutes ago
_cybersecurity_
Exploit

Serious Security Flaw: Metasploit Module Targets Active SharePoint Exploits **New Metasploit module exposes critical zero-day vulnerabilities in Microsoft SharePoint Server, allowing unauthenticated remote code execution.** **Key Points:** - SharePoint vulnerabilities (CVE-2025-53770/53771) exploited through a simple HTTP request. - Unauthenticated remote code execution on SharePoint 2019 with SYSTEM privileges. - Immediate …

Also mentions: CVE-2025-53771
1
1
3.0
View Original High Risk
Reddit 13 hours, 42 minutes ago
Particular-Bug6105

Impact of CVE-2025-53770 on workflows? After patching our SharePoint servers per Microsoft's guidance, at least one Sp2010 workflow action is no longer working. Specifically, "copy list item." When attempting to publish a workflow with this action, I get "Unexpected error on server associating the workflow." Workflows that already have the …

Reddit 14 hours, 29 minutes ago
Sunitha_Sundar_5980
Exploit

Critical Zero-Day in Microsoft SharePoint Enables Unauthenticated Remote Code Execution CVE-2025-53770 (CVSS 9.8) is a critical zero-day vulnerability affecting **on-premises Microsoft SharePoint Server**. It is a variant of CVE-2025-49704 and stems from unsafe deserialization of untrusted data, allowing **unauthenticated remote code execution** over the network. Attackers exploit this flaw to …

1
1.0
View Original High Risk
Reddit 17 hours, 41 minutes ago
crstux
Exploit

🔥 Top 10 Trending CVEs (24/07/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2024-4947](https://nvd.nist.gov/vuln/detail/CVE-2024-4947)** - 📝 Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security …

1
1.0
View Original High Risk
Reddit 18 hours, 37 minutes ago
pentest-tools

Patching SharePoint servers to make sure your infrastructure isn't vulnerable to #ToolShell (CVE-2025-53770) is half the job. The other half is... ... validating that mitigations actually worked across your entire environment. Our Network Scanner provides immediate, targeted, and FAST detection for this 🔴 critical, unauthenticated RCE vulnerability: ✅ instantly scan …

Reddit 1 day, 10 hours ago
TeamResilio
Exploit

SharePoint Zero-Day (CVE-2025-53770) — What Your Patch Won’t Fix TL;DR: A SharePoint zero-day lets attackers in and stay in even after patching. If you rely on centralized infrastructure, it’s time to rethink how you protect and recover your data. A new SharePoint zero-day (CVE-2025-53770) was disclosed last week. It allows …

2
2.0
View Original High Risk
Reddit 1 day, 16 hours ago
Leonie-Lionheard
Exploit

Microsoft bleibt stabil - diesmal Sharepoint > CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks > CVE-2025-49704 – SharePoint Remote Code Execution CVE-2025-49706 – SharePoint Post-auth Remote Code Execution CVE-2025-53770 – SharePoint ToolShell Authentication Bypass and Remote Code Execution CVE-2025-53771 – SharePoint ToolShell Path Traversal

9
9.0
View Original High Risk

References

Published: 2025-07-20T01:06:33.607Z
Last Modified: 2025-07-22T02:51:48.226Z
Copied to clipboard!