PT-2025-30222 · Microsoft · Office Sharepoint +1

Published

2025-07-20

·

Updated

2025-07-26

·

CVE-2025-53771

CVSS v2.0
7.5
VectorAV:N/AC:L/Au:S/C:C/I:P/A:N

**Name of the Vulnerable Software and Affected Versions:**

Microsoft Office SharePoint Server (affected versions not specified)

**Description:**

An improper limitation of a pathname to a restricted directory ('path traversal') exists in Microsoft Office SharePoint, potentially allowing an attacker to perform spoofing over a network. This vulnerability is actively being exploited in attacks, with reports indicating over 400 victims globally. Attackers are leveraging this issue to steal credentials and gain privileged access. The vulnerability is related to a patch bypass, enabling exploitation even on servers with previously applied fixes. A related vulnerability, CVE-2025-53770, allows for remote code execution (RCE) via the `/layouts/15/ToolPane.aspx` endpoint by sending a specially crafted POST request with `DisplayMode=Edit`, potentially leading to full server compromise, including web shell installation. Initial scans detected exploitation attempts as early as July 16, 2025.

**Recommendations:**

At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Improper Neutralization

RCE

Path traversal

Improper Authentication

Weakness Enumeration

Related Identifiers

BDU:2025-08787
CVE-2025-53771
ZDI-25-652

Affected Products

Office Sharepoint
Sharepoint Server