info: name: Microsoft SharePoint - Remote Code Execution "Toolshell" author: SamIntruder severity: critical description: | Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 existsin the wild. Microsoft is preparing and fully testing a comprehensive updateto address this vulnerability.In the meantime, please make sure that the mitigation provided in this CVE documentation isin place so that you are protected from exploitation. impact: | Unauthenticated attackers can exploit unsafe deserialization to achieve remote code execution on SharePoint Server, leading to full system compromise. reference: - https://github.com/hazcod/CVE-2025-53770/blob/main/pkg/payload/test_payload.go - https://x.com/codewhitesec/status/1944743478350557232 - https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/ - https://nvd.nist.gov/vuln/detail/CVE-2025-53770 classification: cve-id: CVE-2025-53770 cvss-score: 9.8 cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H metadata: verified: true max-request: 1 shodan-query: http.component:"Sharepoint" tags: cve,cve2025,kev,sharepoint,rce