Overview
The ShareAll vulnerability (CVE-2025-53770) is a critical, actively exploited remote code execution (RCE) flaw affecting on-premises Microsoft SharePoint Server 2016, 2019, and Subscription Edition. This vulnerability allows unauthenticated attackers to gain full control over vulnerable SharePoint environments. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Microsoft have confirmed widespread exploitation impacting organizations globally since July 2025.
Technical Details
/layouts/15/ToolPane.aspx?DisplayMode=Edit
, using a forged Referer header (/_layouts/SignOut.aspx
).spinstall0.aspx
) into SharePoint’s layouts directory. This file extracts cryptographic secrets—notably the ASP.NET ValidationKey
and DecryptionKey
—from SharePoint’s configuration.NT AUTHORITY\IUSR
.Relation to Earlier Vulnerabilities
CVE-2025-53770 is a variant and patch bypass of previous SharePoint vulnerabilities (CVE-2025-49704 and CVE-2025-49706) discovered at Pwn2Own Berlin. Initial patches for these earlier flaws were insufficient; attackers adapted by discovering new ways to exploit SharePoint’s workflow validation logic and data deserialization mechanisms.
Mitigation and Detection
Microsoft and CISA have released emergency patches for all supported SharePoint Server versions. Organizations must:
/ToolPane.aspx
with unusual headers and activity involving uploads of unknown ASPX files to the layouts directory.Conclusion
The ShareAll (CVE-2025-53770) vulnerability represents one of the most serious SharePoint security threats in recent years. Its ease of exploitation, unauthenticated attack path, and potential for persistent, deep access require immediate attention and action from all organizations operating on-premises SharePoint environments. Swift patching, configuration of AMSI, prompt machine key rotation, and reinforced detection measures are essential to defend against this severe threat.