Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-53770— Microsoft SharePoint Server Remote Code Execution Vulnerability

CVSS 9.8 · Critical KEV · Ransomware EPSS 88.18% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-53770

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Microsoft SharePoint Server Remote Code Execution Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
可信数据的反序列化
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft SharePoint Server 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft SharePoint Server是美国微软(Microsoft)公司的一款协作平台。 Microsoft SharePoint Server存在安全漏洞,该漏洞源于反序列化不受信任数据,可能导致远程代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftMicrosoft SharePoint Enterprise Server 2016 16.0.0 ~ 16.0.5513.1001 -
MicrosoftMicrosoft SharePoint Server 2019 16.0.0 ~ 16.0.10417.20037 -
MicrosoftMicrosoft SharePoint Server Subscription Edition 16.0.0 ~ 16.0.18526.20508 -

II. Public POCs for CVE-2025-53770

#POC DescriptionSource LinkShenlong Link
1Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-53770.yamlPOC Details
2Detects a persistent webshell named 'spinstall0.aspx' deployed on Microsoft SharePoint servers. This file exposes sensitive cryptographic machineKey values from the SharePoint configuration, indicating the presence of a ToolShell backdoor implant. This implant is linked to targeted post-auth RCE campaigns exploiting CVE-2025-53770. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/backdoor/sharepoint-toolshell-backdoor.yamlPOC Details
3CVE-2025-53770https://github.com/B1ack4sh/Blackash-CVE-2025-53770POC Details
4A critical zero-day vulnerability CVE‑2025‑53770 has been actively exploited in the wild against on-premises Microsoft SharePoint Server. Dubbed "ToolShell," this exploit leverages a deserialization flaw (variant of CVE‑2025‑49706, CVSS: 6.3).https://github.com/RukshanaAlikhan/CVE-2025-53770POC Details
5Nonehttps://github.com/Bluefire-Redteam-Cybersecurity/bluefire-sharepoint-cve-2025-53770POC Details
6This PowerShell script detects indicators of compromise for CVE-2025-53770 — a critical RCE vulnerability in Microsoft SharePoint. Created by @n1chr0x and @BlackRazer67https://github.com/n1chr0x/ZeroPointPOC Details
7POChttps://github.com/kaizensecurity/CVE-2025-53770POC Details
8A comprehensive security monitoring solution for SharePoint Server with specific protection against CVE-2025-53770 and other threatshttps://github.com/paolokappa/SharePointSecurityMonitorPOC Details
9SharePoint WebPart Injection Exploit Toolhttps://github.com/soltanali0/CVE-2025-53770-ExploitPOC Details
10Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability.https://github.com/hazcod/CVE-2025-53770POC Details
11ToolShell scanner - CVE-2025-53770 and detection informationhttps://github.com/ZephrFish/CVE-2025-53770-ScannerPOC Details
12Hunting for Critical SharePoint Vulnerability CVE-2025-53770https://github.com/siag-itsec/CVE-2025-53770-HuntingPOC Details
13Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770https://github.com/grupooruss/CVE-2025-53770-CheckerPOC Details
14Nonehttps://github.com/tripoloski1337/CVE-2025-53770-scannerPOC Details
15A critical zero-auth RCE vulnerability in SharePoint (CVE-2025-53770), now exploited in the wild, building directly on the spoofing flaw CVE-2025-49706.https://github.com/AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCEPOC Details
16CVE-2025-53770 – Vulnerability Research & Exploitationhttps://github.com/b33b0y/CVE-2025-53770POC Details
17Nonehttps://github.com/GreenForceNetwork/Toolshell_CVE-2025-53770POC Details
18Nonehttps://github.com/imbas007/CVE-2025-53770-Vulnerable-ScannerPOC Details
19A Python-based reconnaissance scanner for safely identifying potential exposure to SharePoint vulnerability CVE-2025-53770.https://github.com/Sec-Dan/CVE-2025-53770-ScannerPOC Details
20Unauthenticated Remote Code Execution via unsafe deserialization in Microsoft SharePoint Server (CVE-2025-53770)https://github.com/MuhammadWaseem29/CVE-2025-53770POC Details
21Exploit tool for SharePoint WebPart Injection via ToolPane.aspx, enabling .NET deserialization and remote code execution. 🛠️🔍 Secure your SharePoint now!https://github.com/bijikutu/CVE-2025-53770-ExploitPOC Details
22Explore the Microsoft SharePoint CVE-2025-53770 proof of concept. Learn about this vulnerability and its implications. 🐙💻https://github.com/Lapesha/CVE-2025-53770POC Details
23Scanner for CVE-2025-53770, a SharePoint vulnerability. Check if your server is vulnerable and extract version info. 🛠️🔍https://github.com/Hassanopop/CVE-2025-53770POC Details
24Identify exposure to the critical SharePoint vulnerability CVE-2025-53770 with this effective scanner tool. Secure your systems today! 🛡️🔍https://github.com/m4r1x/CVE-2025-53770-ScannerPOC Details
25Exploit & research for CVE‑2025‑53770 – a zero‑day remote code execution vulnerability in Microsoft SharePoint (on‑premises).https://github.com/Kamal-Hegazi/CVE-2025-53770-SharePoint-RCEPOC Details
26A sophisticated, wizard-driven Python exploit tool targeting CVE-2025-53770, a critical (CVSS 9.8) unauthenticated remote code execution (RCE) vulnerability in on-premises Microsoft SharePoint Server (2016, 2019, Subscription Edition)https://github.com/exfil0/CVE-2025-53770POC Details
27Scans Windows IIS logs for signs of CVE-2025-53770 & CVE-2025-53771https://github.com/zach115th/ToolShellFinderPOC Details
28Detection rules for CVE-2025-53770https://github.com/nisargsuthar/suricata-rule-CVE-2025-53770POC Details
29Nonehttps://github.com/bharath-cyber-root/sharepoint-toolshell-cve-2025-53770POC Details
30Do you really think SharePoint is safe? https://github.com/Rabbitbong/OurSharePoint-CVE-2025-53770POC Details
31Nonehttps://github.com/Udyz/CVE-2025-53770-ExploitPOC Details
32Honeypot for CVE-2025-53770 aka ToolShellhttps://github.com/a-hydrae/ToolShell-HoneypotPOC Details
33Unauthenticated Remote Code Execution via unsafe deserialization in Microsoft SharePoint Server (CVE-2025-53770)https://github.com/0xray5c68616e37/cve-2025-53770POC Details
34Nonehttps://github.com/BirdsAreFlyingCameras/CVE-2025-53770_Raw-HTTP-Request-GeneratorPOC Details
35An activity to train analysis skills and reportinghttps://github.com/bossnick98/-SOC342---CVE-2025-53770-SharePoint-ToolShell-Auth-Bypass-and-RCEPOC Details
36CVE-2025-53770 Mass Scannerhttps://github.com/3a7/CVE-2025-53770POC Details
37Nonehttps://github.com/r3xbugbounty/CVE-2025-53770POC Details
38Nonehttps://github.com/daryllundy/CVE-2025-53770POC Details
39🎯 Vulnerability scanner for SharePoint servers affected by CVE-2025-53770. Detects unsafe deserialization using ToolPane.aspx with a crafted base64+gzip payload. 🛡️ Developed by Ahmed Tamer.https://github.com/0x-crypt/CVE-2025-53770-ScannerPOC Details
40Nonehttps://github.com/Immersive-Labs-Sec/SharePoint-CVE-2025-53770-POCPOC Details
41A critical vulnerability in Microsoft SharePoint Server allows unauthenticated remote code execution via deserialization of untrusted data. Microsoft is aware of active exploitation; apply CVE mitigations immediately. Severity: Critical.https://github.com/harryhaxor/CVE-2025-53770-SharePoint-Deserialization-RCE-PoCPOC Details
42Nonehttps://github.com/SDX442/CVE-2025-53770POC Details
43Nonehttps://github.com/Agampreet-Singh/CVE-2025-53770POC Details
44Nonehttps://github.com/GreenForceNetworks/Toolshell_CVE-2025-53770POC Details
45Nonehttps://github.com/CyprianAtsyor/ToolShell-CVE-2025-53770-SharePoint-Exploit-Lab-LetsDefendPOC Details
46CVE-2025-53770 - SharePointhttps://github.com/ghostn4444/CVE-2025-53770POC Details
47Nonehttps://github.com/saladin0x1/CVE-2025-53770POC Details
48CVE-2025-53770 实验环境https://github.com/go-bi/sharepoint-CVE-2025-53770POC Details
49🔍 Explore Microsoft SharePoint CVE-2025-53770 with this proof of concept for educational use, emphasizing security insights in authorized environments.https://github.com/taqiaferdianshah/CVE-2025-53770POC Details
50🛠️ Exploit Microsoft SharePoint WebPart Injection vulnerabilities for .NET deserialization and remote code execution using ToolPane.aspx.https://github.com/yashz0007/CVE-2025-53770-ExploitPOC Details
51Nonehttps://github.com/fentnttntnt/CVE-2025-53770POC Details
52🔍 Scan for potential exposure to the critical SharePoint vulnerability CVE-2025-53770 with this simple and effective tool for authorized testing.https://github.com/ziisenpai/CVE-2025-53770-ScannerPOC Details
53Nonehttps://github.com/Michaael01/LetsDefend--SOC-342-CVE-2025-53770-SharePoint-Exploit-ToolShellPOC Details
54Exploit & research for CVE‑2025‑53770 – a zero‑day remote code execution vulnerability in Microsoft SharePoint (on‑premises).https://github.com/0xh3g4z1/CVE-2025-53770-SharePoint-RCEPOC Details
55Nonehttps://github.com/victormbogu1/LetsDefend-SOC342-CVE-2025-53770-SharePoint-ToolShell-Auth-Bypass-andRCE-EventID-320POC Details
56Honeypot for CVE-2025-53770 aka ToolShellhttps://github.com/bitsalv/ToolShell-HoneypotPOC Details
57Reproducible incident micro-postmortem for on-prem Microsoft SharePoint “ToolShell” (CVE-2025-53770): ATT&CK snapshot, “logs that matter” table, three hunts (KQL/SPL/Sigma), first-4-hours comms, sample data, and figures. Built for fast triage; no org data; SharePoint Online out of scope.https://github.com/Cameloo1/sharepoint-toolshell-micro-postmortemPOC Details
58CVE-2025-53770https://github.com/Ashwesker/Blackash-CVE-2025-53770POC Details
59CVE-2025-53770https://github.com/Ashwesker/Ashwesker-CVE-2025-53770POC Details
60Nonehttps://github.com/anwakub/CVE-2025-53770POC Details
61CVE-2025-53770https://github.com/yosasasutsut/Blackash-CVE-2025-53770POC Details
62Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability (fork from hazcod/CVE-2025-53770)https://github.com/rbctee/CVE-2025-53770POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-53770

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-53770

No comments yet


Leave a comment