Critical SharePoint RCE: CVE-2025-53770 and the Perils of Deserialization

A critical deserialization flaw (CVE-2025-53770) in Microsoft SharePoint Server is being actively exploited, enabling remote code execution by unauthenticated attackers. This post dissects the technical root cause, affected versions, and exploitation vectors for security teams.
CVE Analysis

8 min read

ZeroPath Security Research

ZeroPath Security Research

2025-07-19

Critical SharePoint RCE: CVE-2025-53770 and the Perils of Deserialization

Critical SharePoint RCE: CVE-2025-53770 and the Perils of Deserialization

Active exploitation, unauthenticated remote code execution, and no patch yet available—CVE-2025-53770 is a wake-up call for every organization running on-premises SharePoint Server.

Introduction

Attackers are actively breaching enterprise SharePoint deployments, gaining remote code execution with no credentials required. This is not a theoretical risk—CVE-2025-53770 is being exploited in the wild, and Microsoft has yet to release a patch. The vulnerability exposes the core of SharePoint’s data processing to deserialization attacks, allowing adversaries to hijack servers, deploy webshells, and move laterally across networks.

Technical Information

CVE-2025-53770 is a classic but devastating case of unsafe deserialization of untrusted data (CWE-502) in on-premises Microsoft SharePoint Server. The flaw is rooted in SharePoint’s handling of serialized .NET objects—specifically, its failure to properly validate or sanitize serialized input received via network requests.

Vulnerability Mechanism

  • Attack Vector: Remote, unauthenticated attackers send crafted HTTP POST requests to SharePoint endpoints (such as /_api/web/lists) containing malicious serialized .NET payloads.
  • Trigger: SharePoint processes the serialized input using legacy .NET deserialization mechanisms (e.g., BinaryFormatter), which are inherently insecure and can execute arbitrary code embedded in the payload.
  • Impact: The attacker’s code runs in the context of the SharePoint application pool, enabling full system compromise, webshell deployment, and further lateral movement.

Exploitation Flow

  • No authentication required: The vulnerability can be exploited remotely by unauthenticated users, dramatically increasing risk for any exposed SharePoint instance.
  • Common payloads: Attackers typically deploy webshells (malicious .aspx files) or execute system commands to establish persistence and expand access.

Root Cause

The core issue is SharePoint’s reliance on insecure deserialization routines for processing user-supplied data. This is a well-documented anti-pattern in .NET applications, especially when using BinaryFormatter or similar APIs. The absence of input validation or type restrictions allows attackers to supply arbitrary objects that, when deserialized, trigger code execution.

Affected Systems and Versions

  • Microsoft SharePoint Server Subscription Edition (prior to 16.0.18526.20286)
  • Microsoft SharePoint Server 2019 (all versions prior to the forthcoming patch)
  • Microsoft SharePoint Server 2016 Enterprise Edition (all versions prior to the forthcoming patch)

All on-premises deployments processing serialized data via exposed endpoints are at risk. Cloud-hosted SharePoint Online is not affected.

Vendor Security History

Microsoft SharePoint has a recurring history of deserialization vulnerabilities:

Despite Microsoft’s regular patch cadence, unsafe deserialization remains a persistent challenge in SharePoint’s legacy codebase.

References


Security teams must act now: Restrict network access, monitor for suspicious POST requests, and follow Microsoft’s mitigation guidance until a patch is released. This is a critical, actively exploited vulnerability—do not delay.

Source: This report was created using AI

If you have suggestions for improvement or feedback, please reach out to us at [email protected]

Detect & fix
what others miss