Microsoft on Sunday launched security patches for an actively exploited security flaw in SharePoint and likewise disclosed particulars of 1 different vulnerability that it acknowledged has been addressed with “additional sturdy protections.”
The tech massive acknowledged it’s “aware of energetic assaults concentrating on on-premises SharePoint Server prospects by exploiting vulnerabilities partially addressed by the July Security Substitute.”
CVE-2025-53770 (CVSS score: 9.8), as a result of the exploited Vulnerability is tracked, issues a case of distant code execution that arises due to the deserialization of untrusted information in on-premise variations of Microsoft SharePoint Server.
The newly disclosed shortcoming is a spoofing flaw in SharePoint (CVE-2025-53771, CVSS score: 6.3). An anonymous researcher has been credited with discovering and reporting the bug.
“Improper limitation of a pathname to a restricted itemizing (‘path traversal’) in Microsoft Office SharePoint permits a licensed attacker to hold out spoofing over a neighborhood,” Microsoft acknowledged in an advisory launched on July 20, 2025.
Microsoft moreover well-known that CVE-2025-53770 and CVE-2025-53771 are related to 2 completely different SharePoint vulnerabilities documented by CVE-2025-49704 and CVE-2025-49706, which may probably be chained to appreciate distant code execution. The exploit chain, referred to as ToolShell, was patched as part of the company’s July 2025 Patch Tuesday change.
“The change for CVE-2025-53770 comprises additional sturdy protections than the change for CVE-2025-49704,” the Residence home windows maker acknowledged. “The change for CVE-2025-53771 comprises additional sturdy protections than the change for CVE-2025-49706.”
It’s worth noting that Microsoft beforehand characterised CVE-2025-53770 as a variant of CVE-2025-49706. When reached for comment about this discrepancy, a Microsoft spokesperson knowledgeable The Hacker Info that “it’s prioritizing getting updates out to prospects whereas moreover correcting any content material materials inaccuracies as essential.”
The company moreover acknowledged that the current revealed content material materials is correct and that the sooner inconsistency doesn’t have an effect on the company’s steering for patrons.
Every the acknowledged flaws apply to on-premises SharePoint Servers solely, and don’t have an effect on SharePoint On-line in Microsoft 365. The issues have been addressed inside the variations underneath (for now) –
To mitigate potential assaults, prospects are actually helpful to –
- Use supported variations of on-premises SharePoint Server (SharePoint Server 2016, 2019, and SharePoint Subscription Model)
- Apply the most recent security updates
- Be certain that the Antimalware Scan Interface (AMSI) is turned on and permit Full Mode for optimum security, along with an relevant antivirus reply akin to Defender Antivirus
- Deploy Microsoft Defender for Endpoint security, or equal menace choices
- Rotate SharePoint Server ASP.NET machine keys
“After making use of the most recent security updates above or enabling AMSI, it’s vital that prospects rotate SharePoint server ASP.NET machine keys and restart IIS on all SharePoint servers,” Microsoft acknowledged. “Within the occasion you cannot permit AMSI, you’ll must rotate your keys after you place within the model new security change.”
The occasion comes as Eye Security knowledgeable The Hacker Info that at least 54 organizations have been compromised, along with banks, universities, and authorities entities. Full of life exploitation is alleged to have commenced spherical July 18, in step with the company.
The U.S. Cybersecurity and Infrastructure Security Firm (CISA), for its half, added CVE-2025-53770 to its Acknowledged Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Authorities Division (FCEB) firms to make use of the fixes by July 21, 2025.

Palo Alto Networks Unit 42, which can be monitoring what it described as a “high-impact, ongoing menace advertising and marketing marketing campaign,” acknowledged authorities, colleges, healthcare, along with hospitals, and large enterprise companies are at speedy hazard.
“Attackers are bypassing id controls, along with MFA and SSO, to attain privileged entry,” Michael Sikorski, CTO and Head of Danger Intelligence for Unit 42 at Palo Alto Networks, knowledgeable The Hacker Info. “As quickly as inside, they’re exfiltrating delicate information, deploying persistent backdoors, and stealing cryptographic keys. The attackers have leveraged this vulnerability to get into applications and are already establishing their foothold.
“If in case you’ve got SharePoint on-prem uncovered to the online, it’s best to imagine that you just’ve received been compromised at this stage. Patching alone is insufficient to completely evict the menace. What makes this significantly relating to is SharePoint’s deep integration with Microsoft’s platform, along with their firms like Office, Teams, OneDrive and Outlook, which have all of the information useful to an attacker. A compromise doesn’t hold contained—it opens the door to your whole neighborhood.”
The cybersecurity vendor has moreover categorised it as a high-severity, high-urgency menace, urging organizations working on-premises Microsoft SharePoint servers to make use of the obligatory patches with speedy influence, rotate all cryptographic supplies, and interact in incident response efforts.
“A direct, band-aid restore might be to unplug your Microsoft SharePoint from the online until a patch is accessible,” Sikorski added. “A false sense of security would possibly finish in prolonged publicity and widespread compromise.”
(It’s a creating story. Please confirm once more for additional particulars.)
Elevate your perspective with NextTech Info, the place innovation meets notion.
Uncover the most recent breakthroughs, get distinctive updates, and be part of with a world neighborhood of future-focused thinkers.
Unlock tomorrow’s traits proper now: study additional, subscribe to our e-newsletter, and alter into part of the NextTech group at NextTech-news.com
Keep forward of the curve with NextBusiness 24. Discover extra tales, subscribe to our publication, and be part of our rising neighborhood at nextbusiness24.com

