PT-2025-30222 · Microsoft · Office Sharepoint +1
Published
2025-07-20
·
Updated
2025-07-26
·
CVE-2025-53771
7.5
High
Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:P/A:N |
**Name of the Vulnerable Software and Affected Versions:**
Microsoft Office SharePoint Server (affected versions not specified)
**Description:**
An improper limitation of a pathname to a restricted directory ('path traversal') exists in Microsoft Office SharePoint, potentially allowing an attacker to perform spoofing over a network. This vulnerability is actively being exploited in attacks, with reports indicating over 400 victims globally. Attackers are leveraging this issue to steal credentials and gain privileged access. The vulnerability is related to a patch bypass, enabling exploitation even on servers with previously applied fixes. A related vulnerability, CVE-2025-53770, allows for remote code execution (RCE) via the `/layouts/15/ToolPane.aspx` endpoint by sending a specially crafted POST request with `DisplayMode=Edit`, potentially leading to full server compromise, including web shell installation. Initial scans detected exploitation attempts as early as July 16, 2025.
**Recommendations:**
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Improper Neutralization
RCE
Path traversal
Improper Authentication
Related Identifiers
Affected Products
References · 191
- https://zerodayinitiative.com/advisories/ZDI-25-652 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53771 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-53771 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-08787 · Security Note
- https://t.me/c/1519182536/20635 · Telegram Post
- https://twitter.com/DefendEdge/status/1947673256695091426 · Twitter Post
- https://t.me/c/1519182536/20582 · Telegram Post
- https://twitter.com/technijian_/status/1947281264018362658 · Twitter Post
- https://twitter.com/ITSPARCCast/status/1948749154705879254 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1947263477275402250 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1m757ev/top_10_trending_cves_23072025 · Reddit Post
- https://t.me/c/2230009192/28295 · Telegram Post
- https://twitter.com/cybrhoodsentinl/status/1947371005166686484 · Twitter Post
- https://twitter.com/welivesecurity/status/1948324302790570071 · Twitter Post