Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-53770 PoC — Microsoft SharePoint Server Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2025-53770)
Description:Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
Description
CVE-2025-53770 – Vulnerability Research & Exploitation
Readme
# CVE-2025-53770 – Vulnerability Research & Exploitation

This repository contains research, detection tools, and exploitation methods for **CVE-2025-53770**, a critical security vulnerability disclosed in 2025. The goal of this project is to provide a comprehensive technical resource for understanding and demonstrating the vulnerability in a controlled and ethical manner.

> ⚠️ **Legal Disclaimer**: This repository is intended for **educational and authorized security testing** only. Unauthorized access or testing of systems is illegal. Use responsibly.

---

## 📖 About CVE-2025-53770

**CVE-2025-53770** is a critical vulnerability in **Microsoft SharePoint Server (on-premises)** caused by the **deserialization of untrusted data**. It allows **unauthorized, remote attackers** to execute arbitrary code over the network **without authentication**. This vulnerability has been **actively exploited in the wild**.

- **Type**: Deserialization of Untrusted Data  
- **Impact**: Remote Code Execution (RCE)  
- **Attack Vector**: Network (Remote)  
- **Authentication Required**: None  
- **User Interaction Required**: None  
- **Affected Product**: Microsoft SharePoint Server (on-premises)  
- **Exploitation Status**: Known exploit exists in the wild  
- **Patch Status**: Microsoft is preparing a comprehensive update; temporary mitigations are available and **should be applied immediately**

#### 🔐 CVSS v3.1 Base Score

- **Score**: 9.8 (**Critical**)  
- **Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`

---

## 📁 Repository Structure

### 🔍 [Scan](./Scan)

Contains tools and scripts to **detect the presence** of CVE-2025-53770 in vulnerable systems.


### 💥 [Exploit](./Exploit)

Includes **proof-of-concept (PoC) code** to demonstrate how CVE-2025-53770 can be exploited under specific conditions.

---

## 🙌 Credits
* https://github.com/soltanali0/CVE-2025-53770-Exploit
* https://github.com/ZephrFish/CVE-2025-53770-Scanner 
File Snapshot

[4.0K] /data/pocs/d6043fa75b2475cbe76590a27e53a8856fade539 ├── [4.0K] Exploit │   ├── [4.5K] exploit.py │   ├── [3.2K] README.md │   └── [ 112] requirements.txt ├── [2.0K] README.md └── [4.0K] Scanner ├── [4.7K] config.json ├── [ 16K] README.md ├── [ 53] requirements.txt └── [ 42K] scanner.py 2 directories, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →