PT-2025-28601 · Microsoft · Sharepoint Server

Trend Zero Day Initiative

+1

·

Published

2025-07-08

·

Updated

2026-04-03

·

CVE-2025-49704

CVSS v2.0

9.0

High

VectorAV:N/AC:L/Au:S/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Microsoft SharePoint versions prior to the latest patches.
Description The software contains a flaw in the control of code generation, leading to a code injection issue. This allows an authorized attacker to execute code over a network. The vulnerability has been actively exploited by Chinese state-linked hackers, impacting US agencies like the Department of Homeland Security (DHS) and potentially defense systems. Exploitation involves deserialization of untrusted data and can lead to remote code execution. Specifically, the vulnerability allows remote attackers to achieve code execution on the server by sending a specially crafted POST request with malicious WebPart markup. The ToolShell exploit (CVE-2025-49704) has been observed in the wild since July 7th, and initial patches were found to be ineffective, requiring further updates. The vulnerability can be exploited through the DataSetSurrogateSelector, and a bypass of a previously patched issue has been identified. Approximately 24.9K services are found to be vulnerable yearly.
Recommendations Install the latest security patches released by Microsoft to address the vulnerability. Ensure that configuration upgrades are performed after patching, as this was a step missed by many administrators. As a temporary workaround, consider restricting access to the affected SharePoint instances. Monitor systems for suspicious activity and potential exploitation attempts.

Fix

RCE

Code Injection

Weakness Enumeration

Related Identifiers

BDU:2025-08436
CVE-2025-49704
ZDI-25-581

Affected Products

Sharepoint Server