PT-2025-28601 · Microsoft · Office Sharepoint +1
Trend Zero Day Initiative
+1
·
Published
2025-07-08
·
Updated
2025-07-23
·
CVE-2025-49704
9.0
High
Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
### Name of the Vulnerable Software and Affected Versions:
Microsoft SharePoint versions prior to the latest patches.
Microsoft SharePoint Server 2016
Microsoft SharePoint Server 2019
Microsoft SharePoint Server Subscription Edition (SE)
### Description:
The vulnerability involves improper control of code generation ('code injection') in Microsoft Office SharePoint, allowing an authorized attacker to execute code over a network. This issue bypasses a previously patched vulnerability (CVE-2025-49704), demonstrating attackers' ability to adapt and find new exploitation methods. The vulnerability allows an authenticated attacker to execute code remotely. Approximately 24.9K services are potentially affected annually. The vulnerability has been actively exploited in on-premises Microsoft SharePoint servers, leading to unauthorized access and data breaches. SharePoint Online is not affected. The vulnerability can be exploited as long as an attacker has an account on the platform. A proof-of-concept (POC) exploit, known as ToolShell, has been shared and a web shell, Spingstall0.aspx, is associated with the exploitation.
### Recommendations:
Install the latest patches for Microsoft SharePoint Server 2016.
Install the latest patches for Microsoft SharePoint Server 2019.
Install the latest patches for Microsoft SharePoint Server Subscription Edition (SE).
Fix
RCE
Code Injection
Weakness Enumeration
Related Identifiers
Affected Products
References · 118
- https://bdu.fstec.ru/vul/2025-08436 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49704 · Vendor Advisory
- https://microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49704 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-49704 · Security Note
- https://zerodayinitiative.com/advisories/ZDI-25-581 · Security Note
- https://twitter.com/0x534c/status/1946791814222242107 · Twitter Post
- https://twitter.com/0x534c/status/1947657920579309767 · Twitter Post
- https://twitter.com/Operator7771337/status/1947932610102992948 · Twitter Post
- https://twitter.com/gothburz/status/1947165167319425378 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1lxwvlc/top_10_trending_cves_12072025 · Reddit Post
- https://twitter.com/gothburz/status/1947702912655790178 · Twitter Post
- https://reddit.com/r/TechNadu/comments/1m75wid/alert_nnsa_breached_via_sharepoint · Reddit Post
- https://t.me/c/1140606841/19682 · Telegram Post
- https://twitter.com/oxhak/status/1947892024113299729 · Twitter Post