CVE-2025-30384: Microsoft SharePoint Deserialization Flaw Opens Door to Local RCE
Introduction
Deserialization vulnerabilities continue to plague enterprise software, and Microsoft's SharePoint is no exception. CVE-2025-30384, recently disclosed, highlights the persistent risks associated with improper handling of serialized data. This flaw allows authenticated attackers to execute arbitrary code locally, posing significant threats to organizational security.
Affected Systems and Versions
- SharePoint Server Subscription Edition (versions prior to 16.0.18526.20172)
- SharePoint Server 2019 and 2016 Enterprise Edition
Technical Information
CVE-2025-30384 results from improper validation of serialized input (CWE-502). Attackers with authenticated access and Site Owner privileges can exploit this by injecting malicious serialized .NET objects into SharePoint APIs or workflows. The deserialization process, lacking proper validation, executes attacker-controlled code within the SharePoint application pool context.
Attack Vector
- Authenticated attackers submit crafted serialized payloads via SharePoint APIs.
- Exploitation requires Site Owner privileges, limiting the attack surface to insiders or compromised accounts.
Proof of Concept
Currently, no publicly available proof-of-concept exploit exists for CVE-2025-30384.
Patch Information
Organizations must apply the May 2025 security update (KB5002705) for SharePoint Server Subscription Edition, upgrading to version 16.0.18526.20172 or later. Detailed patching instructions and downloads are available from Microsoft's official security advisory.
Detection Methods
- Monitor SharePoint logs for unusual HTTP POST requests to endpoints like
/_api/web/lists
. - Investigate unexpected process creations by
w3wp.exe
. - No known indicators of compromise or exploitation attempts have been reported yet.
Vendor Security History
Microsoft has previously addressed similar deserialization vulnerabilities in SharePoint, including CVE-2025-29793. Their consistent monthly patching cycle demonstrates proactive security management, though recurring issues indicate ongoing challenges in legacy code security.
References
- Microsoft Security Advisory
- NVD CVE-2025-30384
- Microsoft KB5002705 Update
- Zero Day Initiative Analysis
Organizations are urged to prioritize patching and implement robust monitoring to mitigate potential threats associated with CVE-2025-30384.