
Navigating The Microsoft SharePoint Exploit
Publication date: 2025-07-21
Are Your SharePoint Servers Vulnerable?
On July 18, 2025, security researchers confirmed active exploitation of CVE‑2025‑53770, a critical remote code execution flaw in on‑premises Microsoft SharePoint Server, used in large‑scale campaigns against internet‑facing farms 1. For a fully annotated breakdown—including a live Q & A and an AI Assistant you can consult—visit our detailed report at https://basefortify.eu/cve_reports/2025/07/cve-2025-53770.html.
What Is CVE‑2025‑53770?
CVE‑2025‑53770 arises from improper object deserialization in SharePoint’s ToolPane.aspx
edit endpoint. An attacker can send a crafted POST to /_layouts/15/ToolPane.aspx?DisplayMode=Edit
and achieve unauthenticated remote code execution under the SharePoint service account 1.
Who Is Affected?
This issue impacts on‑premises installations only:
- SharePoint Server Subscription Edition
- SharePoint Server 2019
- SharePoint Server Enterprise 2016
SharePoint Online (Microsoft 365) is not affected.
How to Detect If You’re Vulnerable
# 1. Check for installed hotfixes
Get-HotFix -Id KB5002768 -ErrorAction SilentlyContinue |
Select-Object InstalledOn, Description
Get-HotFix -Id KB5002754 -ErrorAction SilentlyContinue |
Select-Object InstalledOn, Description
# 2. Verify SharePoint build version
$build = (Get-SPFarm).BuildVersion
Write-Host "SharePoint Build Version: $build"
Edition | Minimum Patched Build |
---|---|
SharePoint Server 2019 | 16.0.10417.20027 or later |
SharePoint Enterprise Server 2016 | 16.0.5508.1000 or later |
Mitigation and Remediation
1. Apply Official Security Updates
Subscription Edition: KB5002768
SharePoint Server 2019: KB5002754
SharePoint Server 2016: monitor Microsoft guidance for the July 2025 roll‑up.
2. Enable AMSI Integration
Ensure your antivirus supports the Antimalware Scan Interface (AMSI):Get-MpPreference | Select-Object DisableRealtimeMonitoring
3. Rotate ASP.NET Machine Keys
After patching:Update-SPMachineKey iisreset
4. Temporary Endpoint Block
As an interim measure, block unauthenticated POSTs toToolPane.aspx
:Import-Module WebAdministration Add-WebConfigurationProperty -pspath 'MACHINE/WEBROOT/APPHOST' ` -filter "system.webServer/security/requestFiltering/hiddenSegments" ` -name "." -value @{segment='ToolPane.aspx'}
Why BaseFortify.eu?
At BaseFortify.eu, we simplify vulnerability management. With a single PowerShell script, you can inventory all your applications and operating systems, then upload that data to our platform. Whenever a new CVE matches one of your components, our system instantly notifies you and provides tailored mitigation steps—so you never miss a critical update.
Ready to take control of your security? Register for free at BaseFortify.eu today to start inventorying your applications and operating systems, receive real‑time vulnerability alerts, and access tailored mitigation guidance—all at no cost.
References
- Microsoft Security Update Guide: KB5002768, KB5002754
- CISA Known Exploited Vulnerabilities Catalog
- BaseFortify Annotated Report: CVE‑2025‑53770
- Security Research: “ToolShell” exploitation campaigns