A Microsoft SharePoint 0-Day Security Vulnerability Was Just Weaponized At Scale

hero sharepoint vulnerability july 2025
Microsoft Systems administrators everywhere, it looks like you get a Patch Monday as a side dish to the usual Patch Tuesday this week. There's a full remote code vulnerability (RCE) exploit for SharePoint running around, letting any attacker remotely issue commands and gain full access to the service and your data, with a pathway for more malfeasance in the machine and associated network.

The vulnerability in question affects SharePoint Subscription Edition, SharePoint 2019, and SharePoint 2016. Thankfully, the cloud service SharePoint Online in Microsoft 365 is unaffected. The exploit in question is actually a chaining of related vulnerabilities, starting with letting an authenticated user spoof their identity, then using that to post a carefully crafted HTTP request to a SharePoint URL, then extracting the SharePoint machine authentication keys. From that point on, it's pretty much free reign.

sad sysadmin sharepoint vulnerability july 2025

The first exploit chain is called ToolShell, found by Code White GmbH, comprising CVE-2025-49704 and CVE-2025-49706. According to the detailed account by Eye Security, at the time those vulnerabilities were just a proof-of-concept, but eventually the team found signs of active exploitation on a particular server. They then scanned over 8,000 machines and found "dozens" of compromised installations, concluding that there were already active exploits in the wild.

Thankfully, the vulnerabilities have already been patched. Microsoft rolled up the vulnerabilities under the umbrella of CVE-2025-53771 and published a detailed advisory for patching and mitigation. The summary is that administrators should predictably install the latest patches, including the July 2025 security updates, enable Antimalware Scan Interface with an accompanying security suite (Microsoft Defender or other), and deploy Defender for Endpoint protection or an equivalent. Very importantly, you need to rotate the SharePoint Server ASP.NET security keys, since those are presumed to be stolen already.