Microsoft has issued an emergency patch for a critical zero-day vulnerability in SharePoint Server that has already been weaponised in live attacks.
The flaw, tracked as CVE-2025-53770 and carrying a CVSS score of 9.8, enables unauthenticated attackers to remotely execute code on vulnerable, on-premise SharePoint servers.
Dubbed ToolShell, the exploit chain allows attackers to gain full control of a SharePoint Server instance without any user interaction or credentials. The attack abuses the way SharePoint handles deserialization of untrusted data. A related path traversal flaw (CVE-2025-53771) also forms part of the attack chain. Microsoft 365-hosted SharePoint Online is not affected, but organisations using on-prem deployments of SharePoint Subscription Edition, SharePoint 2019, or SharePoint 2016 are urged to act quickly.
Reports suggest that this zero-day vulnerability has already been exploited to target US federal agencies, universities, energy companies, and telecommunications providers. Attackers have been observed deploying malicious web shells that enable remote command execution via HTTP, allowing them to maintain persistent access and control.
The attack path appears to have originated from a proof-of-concept shared on social media that combined known SharePoint vulnerabilities into a new unauthenticated exploit. Security teams observed widespread exploitation as early as 18 July, with dozens of SharePoint systems found compromised globally.
Microsoft has now released security patches for all affected versions:
SharePoint Subscription Edition
SharePoint Server 2019
SharePoint Server 2016
Organisations should apply updates immediately. Microsoft also recommends:
Rotating ASP.NET machine keys both before and after patching
Enabling Microsoft Defender Antivirus and AMSI on all SharePoint servers
Using Defender for Endpoint or similar tooling to detect suspicious activity
Monitoring for known indicators of compromise, such as unusual POST requests to /layouts/15/ToolPane.aspx or web shells like spinstall0.aspx
Since the vulnerability was disclosed, Microsoft has attributed the attacks to multiple Chinese-linked threat actors, including Linen Typhoon, Violet Typhoon, and Storm-2603. These groups have been observed exploiting the vulnerability to deploy web shells and maintain long-term access to compromised systems.
To make matters worse, a public proof-of-concept (PoC) exploit for CVE-2025-53770 has now been released on GitHub, increasing the likelihood of widespread exploitation by additional threat actors. The US Cybersecurity and Infrastructure Security Agency (CISA) has added the flaw to its Known Exploited Vulnerabilities catalogue and mandated immediate patching across federal systems.
Given SharePoint’s critical role in collaboration and internal data storage, this vulnerability presents a serious and immediate risk. Now that a patch is available for all versions and exploitation is active, organisations must act without delay to reduce the risk of compromise.
Published: 25 July 2025 | Update to original article
Since our initial coverage of the ToolShell exploit chain affecting SharePoint Server, the situation has escalated significantly.
Threat actor Storm‑2603, believed to be linked to China, has been observed deploying Warlock ransomware as part of a coordinated campaign targeting organisations using on-premises versions of SharePoint. The attacker is exploiting a combination of vulnerabilities, including CVE‑2025‑53770, CVE‑2025‑53771, CVE‑2025‑49706 (spoofing), and CVE‑2025‑49704 (remote code execution).
Storm‑2603 is known to operate alongside other state-affiliated groups such as Linen Typhoon and Violet Typhoon, who have also shown interest in exploiting these flaws, though their campaigns appear to focus more on espionage and data theft. Storm‑2603, however, is now using the vulnerabilities to launch full-scale ransomware attacks.
After gaining access via vulnerable SharePoint instances, Storm‑2603 has been seen using the following techniques:
The group has also attempted to steal ASP.NET machine keys, which are critical to SharePoint authentication processes, potentially enabling wider access and deeper compromise.
The shift from proof-of-concept exploitation to real-world ransomware deployment is a significant development, especially as exploitation is now widespread and more threat actors are likely to follow Storm‑2603’s lead.
If your organisation uses on-prem SharePoint, now is the time to act. Patch, investigate, and prepare a response plan. Applying updates immediately is critical to reducing the risk of compromise.
Please contact us here if you need support.