EUVD-2025-17733

| CVE-2025-47166 HIGH
2025-06-10 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17733
PoC Detected
Jul 09, 2025 - 14:02 vuln.today
Public exploit code
CVE Published
Jun 10, 2025 - 17:23 nvd
HIGH 8.8

Description

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

Analysis

Critical deserialization vulnerability in Microsoft Office SharePoint that allows authenticated attackers to execute arbitrary code remotely with high impact to confidentiality, integrity, and availability. The vulnerability affects SharePoint environments where an authorized user can submit malicious serialized objects, bypassing input validation due to unsafe deserialization practices (CWE-502). While the attack requires valid credentials (PR:L), the network-accessible attack vector (AV:N), low attack complexity (AC:L), and high CVSS score of 8.8 indicate significant real-world risk, particularly in organizations with broad internal user bases or federated access.

Technical Context

This vulnerability stems from unsafe deserialization of untrusted data in Microsoft Office SharePoint's object handling mechanisms. CWE-502 (Deserialization of Untrusted Data) occurs when SharePoint deserializes serialized objects without proper validation, allowing attackers to instantiate arbitrary classes and execute malicious payloads. The vulnerability likely affects SharePoint's web services, document processing, or configuration serialization layers that accept user-supplied input. The attack surface includes SharePoint's SOAP/REST APIs, document upload handlers, or workflow engines where serialized .NET objects are processed. Affected components typically involve System.Runtime.Serialization.Formatters (BinaryFormatter, NetDataContractSerializer) or similar deserialization methods that evaluate untrusted object graphs. The vulnerability is specific to authenticated contexts within SharePoint farms or hybrid deployments where principals have document upload, list modification, or workflow authoring permissions.

Affected Products

Microsoft Office SharePoint (specific versions require vendor advisory cross-reference, typically): SharePoint Server 2019, SharePoint Server 2016, SharePoint Online (Microsoft 365), and potentially earlier versions. Affected components include SharePoint Foundation, SharePoint Enterprise, and cloud-hosted variants. CPE data would be of the form: cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:*:*:*:* (versions and editions vary). Organizations should consult Microsoft Security Advisory and KB articles specific to CVE-2025-47166 for exact version matrices. Likely affected configurations include on-premises farms with document libraries, list web services, and workflow execution enabled. Hybrid and cloud-only deployments (SharePoint Online) may have different exposure based on Microsoft's mitigation controls.

Remediation

1. PATCH IMMEDIATELY: Apply Microsoft security updates for CVE-2025-47166 to all affected SharePoint installations. Patch releases vary by version (Server 2019 vs. 2016 vs. Online); consult Microsoft's official patch KB article for your deployment. 2. WORKAROUNDS (if patch unavailable): Restrict SharePoint site collection access to trusted users; disable or isolate SharePoint web services (SPUserCodeService, SPListWebService) if not required; enforce IP-based access controls to SharePoint front-end servers. 3. DETECTION & MONITORING: Audit SharePoint ULS logs for deserialization exceptions or unexpected object instantiation; monitor network traffic for anomalous SOAP/REST requests to document upload or list modification endpoints; enable SharePoint diagnostic logging at verbose level. 4. SSVC MITIGATION: If exploitation in-the-wild is confirmed (KEV status), treat as IMMEDIATE. Coordinate patching across multiple farms in a staged approach to avoid service disruption. 5. VENDOR ADVISORY: Reference Microsoft Security Update Guide (https://msrc.microsoft.com) and search for CVE-2025-47166 KB articles for build numbers and download links.

Priority Score

73
Low Medium High Critical
KEV: 0
EPSS: +8.6
CVSS: +44
POC: +20

Share

EUVD-2025-17733 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy