exploitdb
WORKING POC
by Agampreet Singh · pythonremotewindows
https://www.exploit-db.com/exploits/52405
This exploit leverages unsafe deserialization in SharePoint Server 2019's ToolPane.aspx via the Scorecard:ExcelDataSet control to achieve unauthenticated RCE. It extracts and decodes a compressed payload from the response.
Classification
Working Poc 90%
Target:
Microsoft SharePoint Server 2019 (16.0.10383.20020)
No auth needed
Prerequisites:
Target SharePoint Server 2019 instance · Network access to the target
nomisec
WORKING POC
311 stars
by soltanali0 · remote
https://github.com/soltanali0/CVE-2025-53770-Exploit
This repository contains a functional exploit for CVE-2025-53770, targeting a .NET deserialization vulnerability in Microsoft SharePoint via the ToolPane.aspx endpoint. The exploit includes a Python-based tool for injecting malicious WebParts and a .NET utility (YSLosf) for generating serialized payloads.
Classification
Working Poc 95%
Target:
Microsoft SharePoint Server 2016 (16.0.4351.1000 - 16.0.5508.1000), SharePoint Server 2019 (16.0.10337.12109 - 16.0.10417.20027)
Auth required
Prerequisites:
Authenticated access to SharePoint · Access to /layouts/15/ToolPane.aspx endpoint · Ability to generate .NET serialized payloads
nomisec
WORKING POC
55 stars
by MuhammadWaseem29 · remote
https://github.com/MuhammadWaseem29/CVE-2025-53770
The repository provides a functional exploit PoC for CVE-2025-53770, demonstrating unauthenticated remote code execution via unsafe deserialization in Microsoft SharePoint Server. The PoC includes a crafted HTTP request with a malicious payload targeting a vulnerable endpoint, along with commands to decode and extract the payload.
Classification
Working Poc 95%
Target:
Microsoft SharePoint Server
No auth needed
Prerequisites:
Access to the target SharePoint Server · Network connectivity to the target
nomisec
SCANNER
44 stars
by hazcod · remote
https://github.com/hazcod/CVE-2025-53770
This repository contains a scanner for CVE-2025-53770, a SharePoint unauthenticated RCE vulnerability. It checks for vulnerability by injecting a marker in the SharePoint ToolBox widget and detecting its presence in the server response.
Classification
Scanner 95%
Target:
Microsoft SharePoint Server (on-prem)
No auth needed
Prerequisites:
Access to SharePoint server · Network connectivity to target
nomisec
SUSPICIOUS
43 stars
by kaizensecurity · remote
https://github.com/kaizensecurity/CVE-2025-53770
The repository contains only a README with a disclaimer and an image link, lacking any technical details or exploit code. It appears to be a placeholder or lure without substantive content.
Classification
Suspicious 90%
Target:
Microsoft SharePoint
No auth needed
nomisec
SCANNER
18 stars
by ZephrFish · poc
https://github.com/ZephrFish/CVE-2025-53770-Scanner
This repository contains a scanner for CVE-2025-53770, a deserialization vulnerability in SharePoint's ExcelDataSet component. The scanner detects vulnerable instances by analyzing responses to crafted POST requests and identifying machine key extraction patterns and secondary payload deployment.
Classification
Scanner 95%
Attack Type
Deserialization
Target:
Microsoft SharePoint (2013, 2016, and later versions)
No auth needed
Prerequisites:
Access to SharePoint ToolPane endpoints · Network connectivity to target SharePoint instances
nomisec
SCANNER
14 stars
by 3a7 · remote
https://github.com/3a7/CVE-2025-53770
The repository contains a Python script that scans for CVE-2025-53770, an unauthenticated RCE vulnerability in Microsoft SharePoint. It checks for specific headers and responses to determine if a target is vulnerable but does not include exploit code.
Classification
Scanner 95%
Target:
Microsoft SharePoint
No auth needed
Prerequisites:
Target must be running a vulnerable version of Microsoft SharePoint
nomisec
WRITEUP
8 stars
by AdityaBhatt3010 · poc
https://github.com/AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCE
This repository provides a detailed technical analysis of CVE-2025-53770, an unauthenticated RCE vulnerability in Microsoft SharePoint, including root cause, attack flow, and mitigation strategies. It references real-world exploitation and connects it to CVE-2025-49706.
Classification
Writeup 95%
Target:
Microsoft SharePoint Server 2016, 2019, Subscription Edition
No auth needed
Prerequisites:
Vulnerable SharePoint instance exposed to the internet · Unpatched system (pre-July 2025 updates)
nomisec
WORKING POC
4 stars
by saladin0x1 · remote
https://github.com/saladin0x1/CVE-2025-53770
This repository contains a functional exploit for CVE-2025-53770, targeting a SharePoint ToolPane vulnerability that allows unauthenticated remote code execution via authentication bypass and unsafe deserialization. It includes Python-based exploit code, a scanner for vulnerable targets, and detailed analysis tools.
Classification
Working Poc 95%
Target:
Microsoft SharePoint Server 2019
No auth needed
Prerequisites:
Python 3.x with requests and urllib3 libraries · Network access to target SharePoint servers
nomisec
WORKING POC
4 stars
by Immersive-Labs-Sec · remote
https://github.com/Immersive-Labs-Sec/SharePoint-CVE-2025-53770-POC
This repository contains a functional C# tool that generates a malicious .NET DataSet payload for CVE-2025-53770, a SharePoint deserialization vulnerability. The tool wraps a ysoserial.net-generated payload in a custom XML schema and diffgram, serializes it using BinaryFormatter, and outputs a GZipped Base64-encoded payload.
Classification
Working Poc 95%
Target:
Microsoft SharePoint (version not specified)
No auth needed
Prerequisites:
A ysoserial.net-generated payload (e.g., LosFormatter with TypeConfuseDelegate gadget)
nomisec
WORKING POC
4 stars
by exfil0 · remote
https://github.com/exfil0/CVE-2025-53770
The repository contains a functional Python exploit tool for CVE-2025-53770, targeting unauthenticated RCE in Microsoft SharePoint Server via deserialization in `/_layouts/15/ToolPane.aspx`. It includes features for reconnaissance, payload generation, bypasses, and verification.
Classification
Working Poc 95%
Target:
Microsoft SharePoint Server 2016, 2019, Subscription Edition
No auth needed
Prerequisites:
Python 3.8+ · ysoserial.net for .NET deserialization payloads · Access to `/_layouts/15/ToolPane.aspx`
nomisec
SCANNER
3 stars
by Bluefire-Redteam-Cybersecurity · poc
https://github.com/Bluefire-Redteam-Cybersecurity/bluefire-sharepoint-cve-2025-53770
This repository contains detection and remediation scripts for CVE-2025-53770, a deserialization vulnerability in Microsoft SharePoint Server. It includes PowerShell scripts to detect vulnerable versions, check for patches, and remediate by enabling AMSI and rotating MachineKeys.
Classification
Scanner 95%
Attack Type
Deserialization
Target:
Microsoft SharePoint Server 2016, 2019, Subscription Edition
No auth needed
Prerequisites:
Access to SharePoint Server environment · PowerShell execution rights
nomisec
WORKING POC
2 stars
by Rabbitbong · remote
https://github.com/Rabbitbong/OurSharePoint-CVE-2025-53770
This repository contains a functional C# tool that generates a malicious .NET DataSet payload for CVE-2025-53770, leveraging a LosFormatter deserialization gadget chain. The tool wraps a ysoserial.net payload in a custom XML schema and diffgram, serializes it, and outputs a GZipped Base64-encoded payload for exploitation.
Classification
Working Poc 95%
Target:
Microsoft SharePoint (specific version not specified)
No auth needed
Prerequisites:
A Base64-encoded ysoserial.net payload (e.g., LosFormatter gadget) · Access to a vulnerable SharePoint instance
nomisec
SCANNER
2 stars
by Sec-Dan · poc
https://github.com/Sec-Dan/CVE-2025-53770-Scanner
This repository contains a Python-based scanner for detecting potential exposure to CVE-2025-53770, a critical SharePoint vulnerability. The tool performs subdomain enumeration and checks for signs of vulnerability without exploiting it.
Classification
Scanner 95%
Target:
Microsoft SharePoint Server 2016, 2019, and Subscription Edition
No auth needed
Prerequisites:
Target domain name · Internet access for subdomain enumeration
nomisec
WRITEUP
1 stars
by anwakub · poc
https://github.com/anwakub/CVE-2025-53770
This repository provides a detailed technical advisory for CVE-2025-53770, a critical remote code execution vulnerability in Microsoft SharePoint Server due to deserialization of untrusted data. It includes vulnerability details, impact analysis, mitigation steps, and references to official resources.
Classification
Writeup 95%
Attack Type
Deserialization
Target:
Microsoft SharePoint Server (On-Premises)
No auth needed
Prerequisites:
Network access to vulnerable SharePoint Server
nomisec
WRITEUP
1 stars
by Cameloo1 · poc
https://github.com/Cameloo1/sharepoint-toolshell-micro-postmortem
This repository provides a detailed postmortem analysis of the 'ToolShell' campaign targeting Microsoft SharePoint Server (on-prem) via CVE-2025-53770, including detection hunts, communication templates, and technical breakdowns of the attack flow. It emphasizes deserialization abuse, webshell deployment, and lateral movement techniques.
Classification
Writeup 95%
Attack Type
Deserialization
Target:
Microsoft SharePoint Server (on-prem)
No auth needed
Prerequisites:
Internet-exposed SharePoint/IIS server · Ability to send crafted deserialization payloads · Access to exploit ViewState abuse
nomisec
WRITEUP
1 stars
by paolokappa · poc
https://github.com/paolokappa/SharePointSecurityMonitor
This repository contains PowerShell scripts and workflows for a SharePoint security monitoring tool, focusing on modular architecture and demonstration of security monitoring capabilities. It does not contain exploit code but provides detailed technical documentation and scripts for security monitoring.
Classification
Writeup 90%
Target:
Microsoft SharePoint
Auth required
Prerequisites:
Access to SharePoint environment · PowerShell execution privileges
nomisec
SCANNER
1 stars
by imbas007 · poc
https://github.com/imbas007/CVE-2025-53770-Vulnerable-Scanner
This repository contains a Python-based scanner for detecting CVE-2025-53770 in SharePoint hosts. It uses custom payloads and detection rules to identify vulnerable systems, routing traffic through Burp Suite for analysis.
Classification
Scanner 95%
Target:
Microsoft SharePoint (versions not specified)
No auth needed
Prerequisites:
Python 3.7+ · requests library · Burp Suite (optional) · config.json · payload.json · target list
nomisec
SCANNER
1 stars
by tripoloski1337 · poc
https://github.com/tripoloski1337/CVE-2025-53770-scanner
The repository contains a Python script designed to scan for CVE-2025-53770 by checking the availability of a specific SharePoint endpoint. It does not include exploit code but verifies the presence of a vulnerable endpoint.
Classification
Scanner 90%
Target:
Microsoft SharePoint (version not specified)
No auth needed
Prerequisites:
Target URLs listed in a file named 'targets.txt'
nomisec
WRITEUP
by Zedocun · poc
https://github.com/Zedocun/SharePoint-ToolShell-CVE-2025-53770-Incident-Analysis
This repository provides a detailed incident analysis of CVE-2025-53770, documenting the exploitation chain, including RCE, webshell deployment, and credential extraction in SharePoint. It includes IOCs, MITRE ATT&CK mappings, and a timeline but lacks functional exploit code.
Classification
Writeup 95%
Target:
Microsoft SharePoint
No auth needed
Prerequisites:
Vulnerable SharePoint instance · Network access to target
nomisec
SCANNER
by rbctee · remote
https://github.com/rbctee/CVE-2025-53770
This repository contains a scanner for CVE-2025-53770, an unauthenticated SharePoint RCE vulnerability. It checks for vulnerability by injecting a harmless marker and detecting its presence in the server response, without executing malicious payloads.
Classification
Scanner 95%
Target:
Microsoft SharePoint Server (on-prem)
No auth needed
Prerequisites:
Target running unpatched SharePoint Server
nomisec
SCANNER
by zach115th · poc
https://github.com/zach115th/ToolShellFinder
This repository contains a PowerShell script designed to scan IIS logs for indicators of compromise (IoCs) related to CVE-2025-53770 and CVE-2025-53771 in Microsoft SharePoint. It does not exploit the vulnerabilities but detects potential exploitation attempts by analyzing log patterns.
Classification
Scanner 95%
Target:
Microsoft SharePoint (versions affected by CVE-2025-53770 and CVE-2025-53771)
No auth needed
Prerequisites:
Access to IIS log files · PowerShell 7+ environment
nomisec
WRITEUP
by victormbogu1 · poc
https://github.com/victormbogu1/LetsDefend-SOC342-CVE-2025-53770-SharePoint-ToolShell-Auth-Bypass-andRCE-EventID-320
This repository contains a detailed technical analysis of CVE-2025-53770, a SharePoint zero-day vulnerability (ToolShell) that allows unauthenticated RCE via crafted POST requests to ToolPane.aspx. The writeup includes forensic steps, containment actions, and a breakdown of the attack process, but does not include functional exploit code.
Classification
Writeup 95%
Target:
Microsoft SharePoint Server
No auth needed
Prerequisites:
Access to SharePoint Server · Network connectivity to target
nomisec
WRITEUP
by Michaael01 · poc
https://github.com/Michaael01/LetsDefend--SOC-342-CVE-2025-53770-SharePoint-Exploit-ToolShell
This repository provides a detailed technical analysis of CVE-2025-53770, a critical SharePoint vulnerability involving unauthenticated RCE via insecure deserialization and MachineKey abuse. It includes attack chain breakdown, endpoint analysis, and IoCs but lacks functional exploit code.
Classification
Writeup 95%
Target:
Microsoft SharePoint Server
No auth needed
Prerequisites:
Access to vulnerable SharePoint instance · Network connectivity to target
nomisec
SCANNER
by daryllundy · poc
https://github.com/daryllundy/CVE-2025-53770
This repository contains detection scripts for identifying systems vulnerable to CVE-2025-53770, a deserialization vulnerability. It includes both PowerShell and Python implementations for scanning networks and generating structured JSON reports.
Classification
Scanner 95%
Attack Type
Deserialization
Target:
Systems with unsafe deserialization practices (e.g., Java ObjectInputStream, Python pickle/yaml)
No auth needed
Prerequisites:
Network access to target systems · Open ports (80, 443, 8080, etc.)
nomisec
WORKING POC
by go-bi · remote
https://github.com/go-bi/sharepoint-CVE-2025-53770
This repository contains a functional exploit for CVE-2025-53770, targeting SharePoint Server 2019 via a deserialization vulnerability in the ToolPane.aspx endpoint. The exploit constructs a multi-stage payload involving base64 encoding, gzip compression, and PowerShell execution to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
Microsoft SharePoint Server 2019
No auth needed
Prerequisites:
Access to the target SharePoint server · Network connectivity to the target
nomisec
WORKING POC
by ghostn4444 · remote
https://github.com/ghostn4444/CVE-2025-53770
This repository contains a functional proof-of-concept exploit for CVE-2025-53770, a critical deserialization vulnerability in Microsoft SharePoint Server. The exploit demonstrates remote code execution by leveraging insecure deserialization and an authentication bypass via HTTP header manipulation.
Classification
Working Poc 90%
Target:
Microsoft SharePoint Server (Subscription Edition, 2019, 2016)
No auth needed
Prerequisites:
Access to a vulnerable SharePoint Server instance · Ability to send crafted HTTP requests
nomisec
WRITEUP
by CyprianAtsyor · poc
https://github.com/CyprianAtsyor/ToolShell-CVE-2025-53770-SharePoint-Exploit-Lab-LetsDefend
This repository provides a detailed technical analysis of CVE-2025-53770, a critical deserialization vulnerability in Microsoft SharePoint Server. It includes an attack breakdown, PowerShell payload analysis, and forensic steps taken during a LetsDefend lab exercise.
Classification
Writeup 95%
Target:
Microsoft SharePoint Server (on-premises)
No auth needed
Prerequisites:
Access to vulnerable SharePoint Server · Ability to send crafted POST requests to /ToolPane.aspx · Spoofed referer header to bypass authentication
github
SCANNER
by behnamvanda · shellinfoleak
https://github.com/behnamvanda/CVE-2025-53770-Checker
This repository contains a bash script that checks for the presence of CVE-2025-53770, a SharePoint deserialization vulnerability, by sending a crafted payload to the target endpoint and verifying the response. It does not execute arbitrary code but confirms vulnerability by detecting a specific string in the response.
Classification
Scanner 95%
Attack Type
Deserialization
Target:
Microsoft SharePoint Server 2016, 2019
No auth needed
Prerequisites:
Access to the target SharePoint server's _layouts/15/ToolPane.aspx endpoint
nomisec
WORKING POC
by Agampreet-Singh · infoleak
https://github.com/Agampreet-Singh/CVE-2025-53770
This repository contains a functional exploit for CVE-2025-53770, demonstrating unauthenticated RCE in Microsoft SharePoint Server 2019 via unsafe .NET deserialization in the `Scorecard:ExcelDataSet` control within `ToolPane.aspx`. The exploit sends a crafted payload to trigger deserialization and extracts the response for analysis.
Classification
Working Poc 95%
Target:
Microsoft SharePoint Server 2019 (v16.0.10383.20020)
No auth needed
Prerequisites:
Python 3.x · Vulnerable SharePoint Server 2019 instance · Network access to target
nomisec
WORKING POC
by harryhaxor · remote
https://github.com/harryhaxor/CVE-2025-53770-SharePoint-Deserialization-RCE-PoC
This repository contains a functional exploit for CVE-2025-53770, a critical deserialization vulnerability in Microsoft SharePoint Server. The PoC demonstrates unauthenticated remote code execution by sending a crafted POST request with a malicious payload embedded in the 'MSOTlPn_DWP' parameter.
Classification
Working Poc 90%
Target:
Microsoft SharePoint Server
No auth needed
Prerequisites:
Network access to the target SharePoint Server · Target server must be vulnerable to CVE-2025-53770
nomisec
SCANNER
by bitsalv · poc
https://github.com/bitsalv/ToolShell-Honeypot
This repository is a Docker-based honeypot designed to detect and log exploitation attempts against Microsoft SharePoint vulnerabilities, including CVE-2025-53770. It does not contain exploit code but provides advanced detection mechanisms such as YARA rules, tag-based classification, and payload analysis.
Classification
Scanner 95%
Target:
Microsoft SharePoint
No auth needed
Prerequisites:
Docker environment · Self-signed certificate for HTTPS
nomisec
SCANNER
by 0x-crypt · remote
https://github.com/0x-crypt/CVE-2025-53770-Scanner
This repository contains a Python-based scanner for detecting CVE-2025-53770, an insecure deserialization vulnerability in Microsoft SharePoint. The tool sends a crafted payload to the `ToolPane.aspx` endpoint and checks for specific markers in the response to identify vulnerable instances.
Classification
Scanner 95%
Attack Type
Deserialization
Target:
Microsoft SharePoint
No auth needed
Prerequisites:
Access to the target SharePoint instance · curl, base64, and gzip installed on the system
nomisec
WORKING POC
by r3xbugbounty · remote
https://github.com/r3xbugbounty/CVE-2025-53770
This repository contains a functional exploit for CVE-2025-53770, targeting SharePoint via a crafted POST request to ToolPane.aspx. The exploit leverages a deserialization vulnerability in the ExcelDataSet component to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
Microsoft SharePoint (likely 2016 or 2019, given the assembly versions)
No auth needed
Prerequisites:
Target SharePoint server accessible via HTTP/HTTPS · ToolPane.aspx endpoint reachable · No authentication required (or valid session if auth is needed)
nomisec
WRITEUP
by bossnick98 · poc
https://github.com/bossnick98/-SOC342---CVE-2025-53770-SharePoint-ToolShell-Auth-Bypass-and-RCE
This repository provides a detailed technical analysis of CVE-2025-53770, a deserialization vulnerability in Microsoft SharePoint Server. It includes an investigation of the exploit chain, MITRE ATT&CK techniques, and indicators of compromise (IoCs), but does not contain functional exploit code.
Classification
Writeup 95%
Attack Type
Deserialization
Target:
Microsoft SharePoint Server (on-premises)
No auth needed
Prerequisites:
Network access to vulnerable SharePoint Server · Unpatched SharePoint Server
nomisec
WORKING POC
by BirdsAreFlyingCameras · remote
https://github.com/BirdsAreFlyingCameras/CVE-2025-53770_Raw-HTTP-Request-Generator
This PoC exploits a deserialization vulnerability in Microsoft SharePoint (CVE-2025-53770) by crafting a malicious HTTP request that delivers a base64-encoded PowerShell payload. The payload writes an ASPX file to a SharePoint directory, achieving remote code execution (RCE).
Classification
Working Poc 95%
Target:
Microsoft SharePoint (likely 2016/2019/Subscription Edition)
No auth needed
Prerequisites:
Network access to the target SharePoint server · A malicious ASPX payload file
nomisec
WORKING POC
by Udyz · remote
https://github.com/Udyz/CVE-2025-53770-Exploit
This repository provides a functional exploit for CVE-2025-53770, leveraging a deserialization vulnerability in SharePoint to achieve remote code execution (RCE). The exploit uses ysoserial.exe to generate a malicious ViewState payload, which is then sent via a crafted POST request to execute arbitrary commands on the target server.
Classification
Working Poc 95%
Target:
Microsoft SharePoint
No auth needed
Prerequisites:
Access to the target SharePoint page to extract __VIEWSTATEGENERATOR, VALIDATION_KEY, and VALIDATION_ALG values · ysoserial.exe for generating the malicious payload
nomisec
SCANNER
by nisargsuthar · poc
https://github.com/nisargsuthar/suricata-rule-CVE-2025-53770
This repository contains Suricata detection rules for identifying exploitation attempts of CVE-2025-53770, a SharePoint RCE vulnerability. The rules target specific HTTP request patterns associated with the exploit but do not include functional exploit code.
Classification
Scanner 90%
Target:
Microsoft SharePoint
No auth needed
Prerequisites:
Network access to the target SharePoint server
nomisec
WRITEUP
by bharath-cyber-root · poc
https://github.com/bharath-cyber-root/sharepoint-toolshell-cve-2025-53770
This repository provides a detailed technical analysis of CVE-2025-53770, a critical RCE vulnerability in Microsoft SharePoint Server. It explains the exploit chain involving authentication bypass and unsafe deserialization, along with remediation steps.
Classification
Writeup 95%
Target:
Microsoft SharePoint Server 2016, 2019, and Subscription Edition
No auth needed
Prerequisites:
Access to SharePoint Server · Ability to send crafted HTTP requests
nomisec
WORKING POC
by 0xray5c68616e37 · remote
https://github.com/0xray5c68616e37/cve-2025-53770
The repository provides a functional exploit PoC for CVE-2025-53770, demonstrating unauthenticated RCE in Microsoft SharePoint Server via unsafe deserialization. The PoC includes a curl command to trigger the vulnerability and extract a malicious payload.
Classification
Working Poc 95%
Target:
Microsoft SharePoint Server
No auth needed
Prerequisites:
Access to a vulnerable SharePoint Server instance
nomisec
WORKING POC
by GreenForceNetworks · poc
https://github.com/GreenForceNetworks/Toolshell_CVE-2025-53770
This repository contains a functional exploit for CVE-2025-53770, targeting SharePoint via ViewState manipulation to upload a webshell and achieve remote code execution (RCE). The exploit leverages crafted __VIEWSTATE, __VIEWSTATEGENERATOR, and __EVENTVALIDATION parameters to bypass validation and deploy a malicious ASPX shell.
Classification
Working Poc 95%
Target:
Microsoft SharePoint (version unspecified)
No auth needed
Prerequisites:
Access to a vulnerable SharePoint instance · Valid __VIEWSTATE, __VIEWSTATEGENERATOR, and __EVENTVALIDATION tokens from the target
nomisec
SCANNER
by grupooruss · poc
https://github.com/grupooruss/CVE-2025-53770-Checker
This repository contains a Python script designed to detect the presence of CVE-2025-53770, a critical .NET deserialization vulnerability in SharePoint Server, by checking version numbers and testing for deserialization errors. It does not include exploit code but provides a non-intrusive detection mechanism.
Classification
Scanner 95%
Attack Type
Deserialization
Target:
Microsoft SharePoint Server 2019 and Subscription Edition
No auth needed
Prerequisites:
Network access to the SharePoint server · Python 3.7 or higher · requests library
nomisec
SCANNER
by gmh5225 · poc
https://github.com/gmh5225/ZeroPoint
This PowerShell script scans for indicators of compromise related to CVE-2025-53770 in Microsoft SharePoint Server, including suspicious .aspx files, ULS log entries, and security settings like AMSI and Microsoft Defender. It does not exploit the vulnerability but provides detection and optional mitigation steps.
Classification
Scanner 95%
Target:
Microsoft SharePoint Server (on-premises)
Auth required
Prerequisites:
Administrator access to SharePoint Server · PowerShell execution policy bypass
nomisec
SCANNER
by n1chr0x · poc
https://github.com/n1chr0x/ZeroPoint
This PowerShell script scans for indicators of compromise related to CVE-2025-53770 in Microsoft SharePoint Server, including suspicious .aspx files, ULS log entries, and security settings like AMSI and Microsoft Defender. It does not exploit the vulnerability but provides detection and optional mitigation steps.
Classification
Scanner 95%
Target:
Microsoft SharePoint Server (on-premises)
Auth required
Prerequisites:
Administrative access to SharePoint Server · PowerShell execution policy bypass
nomisec
WRITEUP
by yosasasutsut · poc
https://github.com/yosasasutsut/Blackash-CVE-2025-53770
This repository provides a detailed technical analysis of CVE-2025-53770, a critical RCE vulnerability in Microsoft SharePoint Server due to insecure deserialization of ViewState data. It includes root cause analysis, exploitation steps, detection methods, and mitigation strategies.
Classification
Writeup 95%
Target:
Microsoft SharePoint Server 2016, 2019, and Subscription Edition
No auth needed
Prerequisites:
Access to SharePoint Server · Ability to upload crafted .aspx files · Stolen ASP.NET machineKey
patchapalooza
WORKING POC
by GreenForceNetwork · remote
https://github.com/GreenForceNetwork/Toolshell_CVE-2025-53770
This repository contains a functional exploit for CVE-2025-53770, targeting SharePoint via ViewState manipulation to upload a webshell and achieve remote code execution (RCE). The exploit leverages crafted __VIEWSTATE, __VIEWSTATEGENERATOR, and __EVENTVALIDATION parameters to bypass validation and deploy a malicious ASPX shell.
Classification
Working Poc 95%
Target:
Microsoft SharePoint (version not specified)
Auth required
Prerequisites:
Access to SharePoint page source to extract __VIEWSTATE, __VIEWSTATEGENERATOR, and __EVENTVALIDATION · Valid credentials or session to interact with SharePoint