Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-53770 PoC — Microsoft SharePoint Server Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2025-53770)
Description:Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
Readme
# CVE-2025-53770 – Microsoft SharePoint Server 2019 Unauthenticated RCE via Deserialization

![CVE-2025-53770](https://img.shields.io/badge/CVE-2025--53770-critical-red)
![RCE](https://img.shields.io/badge/exploit-RCE-blue)
![Status](https://img.shields.io/badge/status-verified-success)

> **Exploit Author:** [Agampreet Singh](https://github.com/Agampreet-Singh)  
> **Tool:** RedRoot (https://github.com/Agampreet-Singh/RedRoot)  
> **Date:** August 7, 2025  
> **Tested On:** SharePoint Server 2019 (v16.0.10383.20020) on Windows Server 2019  
> **CVE-ID:** [CVE-2025-53770](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53770)  
> **Vulnerability Type:** Unauthenticated Remote Code Execution (RCE)  
> **Attack Vector:** Unsafe .NET deserialization via `Scorecard:ExcelDataSet` in `ToolPane.aspx`

---

## 🧠 Summary

An unauthenticated remote code execution vulnerability was discovered in **Microsoft SharePoint Server 2019**, specifically within the `ToolPane.aspx` endpoint. This flaw arises from unsafe deserialization of the `Scorecard:ExcelDataSet` control, which allows attackers to inject a GZip-compressed and Base64-encoded .NET object that gets deserialized server-side, leading to arbitrary code execution.

---

---

## ⚙️ Affected Version

- Microsoft SharePoint Server 2019  
  Version: `16.0.10383.20020`

---

## 💥 Exploitation

### Prerequisites

- No authentication required
- Target must be running a vulnerable SharePoint version
- Python 3.x

### Exploit Usage

```bash
python3 cve-2025-53770.py https://target-sharepoint.com
File Snapshot

[4.0K] /data/pocs/0882537aa9d1d3539c68d2df8949e050bd5f0484 ├── [4.0K] cve-2025-53770.py └── [1.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →