Want to stay ahead of threats in 2025? This research report is all you need to stay updated.

CVE-2025-53770

Widespread SharePoint Takeover via Auth Bypass and ASPX Web Shells: CVE-2025-53770 Analyzed

Vulnerability Overview 

CVE ID: CVE-2025-53770 

CVE Title: SharePoint Server ASP.NET Auth Bypass and Remote Web Shell Deployment 

Severity: Critical  

Exploit Status: Active exploitation in the wild; no official patch initially available; public IOCs and PoCs circulating 

Business Risk: Allows attackers to fully control SharePoint servers, access sensitive data and system files, and steal encryption keys. Can lead to remote code execution, hidden backdoors, and spreading through the network. Poses a serious threat to business operations, data security, and reputation.  

Compliance Impact: High chance of violating GDPR, HIPAA, and ISO 27001 due to unauthorized access, stolen encryption keys, and possible leaks of sensitive company or customer data.

Summary

CVE-2025-53770 is a serious flaw in on-premises Microsoft SharePoint that lets attackers skip login and gain full remote access. They use crafted requests to a specific endpoint to install backdoors and steal machine keys, which can be used to impersonate users even after patching. Attacks started in July 2025 and are spreading fast. Affected systems must be isolated, machine keys rotated, IIS restarted, and Microsoft’s guidance followed right away to avoid deeper compromise.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-53770?

Technical Overview

How Does the CVE-2025-53770 Exploit Work?

The attack typically follows these steps:

How Does the CVE-2025-53770 Exploit Work?

What Causes CVE-2025-53770?

Vulnerability Root Cause:  

This vulnerability comes from how SharePoint handles signed data during page processing. If attackers get access to secret keys (like the ValidationKey), they can create fake but valid payloads that SharePoint accepts and runs. This lets them run any code on the server without logging in or triggering security checks.

How Can You Mitigate CVE-2025-53770?

If immediate patching is delayed or not possible:  

  • Isolate or shut down affected SharePoint servers to prevent further exploitation. 
  • Rotate ASP.NET machine keys to invalidate stolen cryptographic material. 
  • Restart IIS on all SharePoint servers after key rotation to apply changes. 
  • Engage incident response teams or trusted cybersecurity experts to investigate and remediate persistence or backdoors. 
  • Monitor logs for indicators of compromise such as requests to known malicious ASPX endpoints (e.g., /layouts/15/spinstall0.aspx). 
  • Block known malicious IP addresses associated with exploit waves.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Will Patching CVE-2025-53770 Cause Downtime?

Patch application impact: Patches are available for a limited set of SharePoint Server versions. Applying them may require testing and scheduling downtime. However, patching alone is insufficient—compromised cryptographic material can still allow post-patch exploitation.  

Mitigation (if immediate patching is not possible): Partial mitigation requires rotating ASP.NET machine keys on all SharePoint servers and restarting IIS. This prevents attackers from using previously stolen keys. Network isolation of affected servers is also recommended. Firewall blocking alone is not sufficient, as persistence may already exist. 

How Can You Detect CVE-2025-53770 Exploitation?

Exploitation Signatures:

Monitor for HTTP requests aimed at SharePoint administration paths such as /_layouts/15/ToolPane.aspx or /_layouts/16/ToolPane.aspx with query parameters like DisplayMode=Edit and a=/ToolPane.aspx. These requests often include a Referer header pointing to /_layouts/SignOut.aspx. Additionally, look for access attempts to /_layouts/15/spinstall0.aspx, which is linked to the malicious payload used for cryptographic key theft.  

MITRE ATT&CK Mapping:

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

Patch/Upgrade Instructions:

Mitigation Steps if No Patch:

Remediation Timeline:

Rollback Plan:

Incident Response Considerations:

Compliance & Governance Notes

Standards Impacted:

Audit Trail Requirement:

Policy Alignment:

CVSS Breakdown Table

MetricValue Description
Base Score9.8Critical vulnerability with severe impact and confirmed active exploitation
Attack VectorNetworkCan be exploited remotely over the network via HTTP requests to SharePoint servers
Attack ComplexityLowNo special conditions required; attackers can exploit easily without complex prerequisites
Privileges RequiredNoneNo prior authentication or elevated permissions needed to execute the attack
User Interaction NoneExploitation occurs without any action from users
Scope Changed Compromise affects not only SharePoint but can lead to domain-wide access and lateral movement
Confidentiality Impact HighAllows attackers to access all SharePoint content, system files, and steal cryptographic keys
Integrity ImpactHighEnables unauthorized code execution and modification of system components
Availability Impact HighDirect denial-of-service impact is minimal or not reported

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.