Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-30397 PoC — Scripting Engine Memory Corruption Vulnerability

Source
Associated Vulnerability
Title:Scripting Engine Memory Corruption Vulnerability (CVE-2025-30397)
Description:Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network.
Description
Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)
Readme
# CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free
Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)


 🧠 Description

This repository contains a proof-of-concept (PoC) exploit for a Use-After-Free vulnerability in the JScript engine (`jscript.dll`) affecting Windows Server 2025 (build 25398 and prior). The vulnerability allows remote code execution by exploiting memory corruption through heap spraying techniques. The PoC demonstrates execution of `calc.exe` via Internet Explorer 11 on the affected system.

---

 🔍 CVE Details

- CVE ID: [CVE-2025-30397](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30397)
- Vendor: Microsoft
- Affected Platforms: Windows Server 2025 (build 25398 and prior)
- Tested On: Windows Server 2025 + Internet Explorer 11 (x86)
- Vulnerability Type: Use-After-Free in `jscript.dll`
- Impact: Remote Code Execution (RCE)
- Severity: Critical



⚙️ Technical Summary

This PoC exploits a Use-After-Free bug caused by improper management of object references in the legacy JScript engine. When triggered via a specially crafted HTML page, the vulnerability allows attackers to corrupt memory and achieve remote code execution. The exploit uses heap spraying to place shellcode in memory, ultimately executing calc.exe on vulnerable systems running Windows Server 2025 with Internet Explorer 11. This demonstrates the impact of the flaw and confirms exploitability under real conditions.

Author

Mohammed Idrees Banyamer
File Snapshot

[4.0K] /data/pocs/cc933c3bca252670b9ca9ec75b6824c8dfdd25bd ├── [4.3K] exploit.py ├── [ 34K] LICENSE └── [1.5K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →