Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network.Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild.Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
- https://github.com/kaizensecurity/CVE-2025-53770
- https://research.eye.security/sharepoint-under-siege/
- https://github.com/0x-crypt/CVE-2025-53770-Scanner
- https://github.com/0xMarcio/cve
- https://github.com/0xh3g4z1/CVE-2025-53770-SharePoint-RCE
- https://github.com/0xray5c68616e37/cve-2025-53770
- https://github.com/3a7/CVE-2025-53770
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/AdityaBhatt3010/CVE-2025-49706-SharePoint-Spoofing-Vulnerability-Under-Active-Exploitation
- https://github.com/AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCE
- https://github.com/Agampreet-Singh/CVE-2025-53770
- https://github.com/Andromeda254/cve
- https://github.com/B1ack4sh/Blackash-CVE-2025-53770
- https://github.com/BirdsAreFlyingCameras/CVE-2025-53770_Raw-HTTP-Request-Generator
- https://github.com/Bluefire-Redteam-Cybersecurity/bluefire-sharepoint-cve-2025-53770
- https://github.com/CyprianAtsyor/ToolShell-CVE-2025-53770-SharePoint-Exploit-Lab-LetsDefend
- https://github.com/DevGreick/devgreick
- https://github.com/GhostTroops/TOP
- https://github.com/GreenForceNetwork/Toolshell_CVE-2025-53770
- https://github.com/GreenForceNetworks/Toolshell_CVE-2025-53770
- https://github.com/Hexastrike/Hexastrike-Threat-Intelligence
- https://github.com/Immersive-Labs-Sec/SharePoint-CVE-2025-53770-POC
- https://github.com/Kamal-Hegazi/CVE-2025-53770-SharePoint-RCE
- https://github.com/Michaael01/Cybersecurity-SOC-Analyst-Lab
- https://github.com/Michaael01/LetsDefend--SOC-342-CVE-2025-53770-SharePoint-Exploit-ToolShell
- https://github.com/Michaael01/SOC-Analyst-Lab
- https://github.com/Mohamed-Habak/siem-incident-analysis
- https://github.com/MuhammadWaseem29/CVE-2025-53770
- https://github.com/Ostorlab/KEV
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/Rabbitbong/OurSharePoint-CVE-2025-53770
- https://github.com/RukshanaAlikhan/CVE-2025-53770
- https://github.com/SDX442/CVE-2025-53770
- https://github.com/Salehswt/SharePoint-CVEs-Hunter
- https://github.com/Sec-Dan/CVE-2025-53770-Scanner
- https://github.com/Threekiii/CVE
- https://github.com/Udyz/CVE-2025-53770-Exploit
- https://github.com/UnHackerEnCapital/RiCharEpoint
- https://github.com/Yvand/terraform-azurerm-sharepoint
- https://github.com/ZephrFish/CVE-2025-53770-Scanner
- https://github.com/a-hydrae/ToolShell-Honeypot
- https://github.com/a-wakeel/a-wakeel
- https://github.com/alukashenkov/Vulners-MCP
- https://github.com/an1shthomas/valhalla-api
- https://github.com/behnamvanda/CVE-2025-53770-Checker
- https://github.com/behnamvanda/behnamvanda
- https://github.com/bharath-cyber-root/sharepoint-toolshell-cve-2025-53770
- https://github.com/bossnick98/-SOC342---CVE-2025-53770-SharePoint-ToolShell-Auth-Bypass-and-RCE
- https://github.com/daryllundy/CVE-2025-53770
- https://github.com/defronixpro/Defronix-Cybersecurity-Roadmap
- https://github.com/exfil0/CVE-2025-53770
- https://github.com/felipealfonsog/felipealfonsog
- https://github.com/fentnttntnt/CVE-2025-53770
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/ghostn4444/CVE-2025-53770
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/go-bi/sharepoint-CVE-2025-53770
- https://github.com/grupooruss/CVE-2025-53770-Checker
- https://github.com/haKC-ai/panhandlr
- https://github.com/harryhaxor/CVE-2025-53770-SharePoint-Deserialization-RCE-PoC
- https://github.com/hazcod/CVE-2025-53770
- https://github.com/iamthefrogy/BountyHound
- https://github.com/imbas007/CVE-2025-53770-Vulnerable-Scanner
- https://github.com/inverzeio/media
- https://github.com/kaizensecurity/CVE-2025-53770
- https://github.com/kharonsec/pentest_toolkit
- https://github.com/khizar-anjum/risky-business-mcp
- https://github.com/kk12-30/2025hvv
- https://github.com/lgturatti/techdrops
- https://github.com/m2kall/github-trending-stats
- https://github.com/mrk336/Hybrid-Cloud-Networking-Considerations
- https://github.com/n1chr0x/ZeroPoint
- https://github.com/nisargsuthar/suricata-rule-CVE-2025-53770
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/packetinside/CISA_BOT
- https://github.com/paolokappa/SharePointSecurityMonitor
- https://github.com/peiqiF4ck/WebFrameworkTools-5.5-enhance
- https://github.com/r3xbugbounty/CVE-2025-53770
- https://github.com/saladin0x1/CVE-2025-53770
- https://github.com/sivolko/Threat-Intelligence-Attack-Flows
- https://github.com/soltanali0/CVE-2025-53770-Exploit
- https://github.com/tanjiti/sec_profile
- https://github.com/taqiaferdianshah/CVE-2025-53770
- https://github.com/tripoloski1337/CVE-2025-53770-scanner
- https://github.com/ums91/CISA_BOT
- https://github.com/unk9vvn/sharepoint-toolpane
- https://github.com/vjackl001/cve-search-tool
- https://github.com/yashz0007/CVE-2025-53770-Exploit
- https://github.com/yembors64632/cve_monitor_Public
- https://github.com/zach115th/ToolShellFinder
- https://github.com/zhanpengliu-tencent/medium-cve
- https://github.com/ziisenpai/CVE-2025-53770-Scanner
- https://github.com/zulloper/cve-poc
- https://github.com/zxarj/wxvl