Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Metasploit Module Released For Actively Exploited SharePoint 0-Day Vulnerabilities

Posted on July 24, 2025July 24, 2025 By CWS

Researchers have developed a brand new Metasploit exploit module focusing on important zero-day vulnerabilities in Microsoft SharePoint Server which are being actively exploited within the wild. 

The module, designated as pull request #20409 within the Metasploit Framework repository, addresses CVE-2025-53770 and CVE-2025-53771, which allow unauthenticated distant code execution (RCE) assaults towards weak SharePoint installations.

Key Takeaways1. SharePoint vulnerabilities (CVE-2025-53770/53771) exploited within the wild through a single HTTP request.2. Unauthenticated RCE on SharePoint 2019 with SYSTEM privileges.3. Safe SharePoint deployments instantly – no patches out there.

Metasploit Module For SharePoint 0-Day

The newly recognized vulnerabilities signify refined patch bypasses for beforehand disclosed safety flaws CVE-2025-49704 and CVE-2025-49706. 

Rapid7 confirmed that the exploit was first noticed in energetic assaults circa July 19, 2025, using a single HTTP request to compromise SharePoint servers. 

The exploit particularly targets the /_layouts/15/ToolPane.aspx endpoint, leveraging a deserialization vulnerability to attain code execution with SYSTEM privileges.

The assault vector demonstrates exceptional simplicity, requiring solely a single malicious HTTP request containing a specifically crafted .NET deserialization payload. 

Throughout testing, the module efficiently compromised a Home windows Server 2022 system working SharePoint Server 2019 model 16.0.10417.20027, establishing a Meterpreter session throughout the c:windowssystem32inetsrv listing.

The Metasploit module exploit/home windows/http/sharepoint_toolpane_rce helps a number of payload configurations, together with cmd/home windows/http/x64/meterpreter_reverse_tcp for full interactive periods and cmd/home windows/generic for command execution. 

The exploit makes use of the Msf::Util::DotNetDeserialization routines to assemble malicious payloads, changing the unique base64-encoded gadget chain found in wild assaults.

Present module choices embrace configurable goal hosts (RHOSTS), ports (RPORT), SSL negotiation, and proxy assist via numerous protocols, together with SOCKS4, SOCKS5, and HTTP. 

The payload supply mechanism helps a number of fetch instructions, together with CERTUTIL, CURL, and TFTP, with automated cleanup capabilities to take away artifacts after execution.

Mitigations

The vulnerability impacts Microsoft SharePoint Server installations, significantly these working model 2019. 

Preliminary patch makes an attempt via KB5002741 carried out path validation checks for ToolPane.aspx endpoints, however the brand new exploit efficiently bypasses these protections. 

Testing revealed that some SharePoint configurations with authentication necessities might have endpoint changes from error.aspx to start out.aspx for profitable exploitation verification.

Organizations ought to instantly assessment their SharePoint deployments for indicators of compromise and implement network-level protections whereas awaiting official Microsoft patches. 

The energetic exploitation of those vulnerabilities, mixed with their unauthenticated nature, presents vital dangers to enterprise environments working affected SharePoint variations.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now 

Cyber Security News Tags:0Day, Actively, Exploited, Metasploit, Module, Released, SharePoint, Vulnerabilities

Post navigation

Previous Post: Chinese Hackers Attacking Windows Systems in Targeted Campaign to Deploy Ghost RAT and PhantomNet Malwares
Next Post: Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

Related Posts

Microsoft Edge Fixes Actively Exploited Chromium Vulnerability Cyber Security News
Top 10 Best Endpoint Security Tools Cyber Security News
Abusing dMSA with Advanced Active Directory Persistence Techniques  Cyber Security News
Tycoon2FA Infra Used by Dadsec Hacker Group to Steal Office365 Credentials Cyber Security News
Mastering Intrusion Detection Systems – A Technical Guide Cyber Security News
GitLab Security Update – Patch for Multiple Vulnerabilities in Community and Enterprise Edition Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025
  • U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025
  • U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News