PT-2025-28601 · Microsoft · Office Sharepoint +1

Trend Zero Day Initiative

+1

·

Published

2025-07-08

·

Updated

2025-07-23

·

CVE-2025-49704

CVSS v2.0
9.0
VectorAV:N/AC:L/Au:S/C:C/I:C/A:C

### Name of the Vulnerable Software and Affected Versions:

Microsoft SharePoint versions prior to the latest patches.

Microsoft SharePoint Server 2016

Microsoft SharePoint Server 2019

Microsoft SharePoint Server Subscription Edition (SE)

### Description:

The vulnerability involves improper control of code generation ('code injection') in Microsoft Office SharePoint, allowing an authorized attacker to execute code over a network. This issue bypasses a previously patched vulnerability (CVE-2025-49704), demonstrating attackers' ability to adapt and find new exploitation methods. The vulnerability allows an authenticated attacker to execute code remotely. Approximately 24.9K services are potentially affected annually. The vulnerability has been actively exploited in on-premises Microsoft SharePoint servers, leading to unauthorized access and data breaches. SharePoint Online is not affected. The vulnerability can be exploited as long as an attacker has an account on the platform. A proof-of-concept (POC) exploit, known as ToolShell, has been shared and a web shell, Spingstall0.aspx, is associated with the exploitation.

### Recommendations:

Install the latest patches for Microsoft SharePoint Server 2016.

Install the latest patches for Microsoft SharePoint Server 2019.

Install the latest patches for Microsoft SharePoint Server Subscription Edition (SE).

Fix

RCE

Code Injection

Weakness Enumeration

Related Identifiers

BDU:2025-08436
CVE-2025-49704
ZDI-25-581

Affected Products

Office Sharepoint
Sharepoint Server