CVE-2025-49712

Microsoft · Microsoft Office SharePoint

A high-severity vulnerability has been discovered in Microsoft Office SharePoint that allows an authorized attacker to take complete control of a server over the network.

Executive summary

A high-severity vulnerability has been discovered in Microsoft Office SharePoint that allows an authorized attacker to take complete control of a server over the network. Successful exploitation could lead to the execution of arbitrary code, enabling the attacker to steal sensitive data, disrupt business operations, or use the compromised server to attack other systems within the organization. Due to the critical nature of this flaw, immediate patching is strongly recommended to prevent potential compromise.

Vulnerability

This vulnerability is classified as a Deserialization of Untrusted Data (CWE-502). The SharePoint application fails to properly validate and sanitize user-supplied data before deserializing it. An attacker with valid credentials to the SharePoint instance can send a specially crafted serialized object to a vulnerable endpoint. When the server processes this malicious object, it can trigger the execution of arbitrary code with the permissions of the SharePoint application's service account, leading to a full system compromise.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit would have a significant business impact, including:

  • Confidentiality Breach: An attacker could access, modify, and exfiltrate all data stored within the SharePoint environment, which often includes sensitive intellectual property, financial records, and personally identifiable information (PII).
  • Integrity Loss: The ability to execute code allows an attacker to alter or delete critical business data, compromising its reliability and trustworthiness.
  • Service Disruption: The attacker could render the SharePoint service unavailable, halting collaboration and productivity for all users who depend on it.
  • Lateral Movement: A compromised SharePoint server provides a powerful foothold within the corporate network, which can be used to launch further attacks against other internal systems.

Remediation

Immediate Action:

  • Prioritize and apply the security updates provided by Microsoft to all affected SharePoint servers immediately.
  • Review SharePoint, IIS, and Windows Event logs for any signs of compromise that may have occurred prior to patching. Look for unusual access patterns or errors related to deserialization.

Proactive Monitoring:

  • Monitor SharePoint ULS and IIS logs for large or malformed POST requests to application endpoints, which may indicate exploitation attempts.
  • Utilize an Endpoint Detection and Response (EDR) solution to monitor for suspicious process creation originating from the SharePoint worker process (w3wp.exe), such as the spawning of powershell.exe or cmd.exe.
  • Monitor network traffic for any unusual outbound connections from SharePoint servers, which could signify data exfiltration or a command-and-control (C2) channel.

Compensating Controls:

  • If immediate patching is not feasible, implement strict Web Application Firewall (WAF) rules designed to detect and block known malicious serialization payloads.
  • Enhance network segmentation to isolate SharePoint servers, restricting outbound internet access and limiting their ability to communicate with other critical internal assets.
  • Ensure the SharePoint service accounts adhere to the principle of least privilege, with no more permissions than are strictly necessary for their operation.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the high CVSS score of 8.8 and the potential for complete system compromise via Remote Code Execution, this vulnerability poses a critical risk to the organization. We strongly recommend that all system administrators prioritize the immediate deployment of the vendor-supplied security updates to all affected SharePoint servers. Although CVE-2025-49712 is not currently listed on the CISA KEV list, its severity and the ubiquity of SharePoint make it a prime candidate for future inclusion. Organizations should treat this vulnerability with the utmost urgency to mitigate the risk of a significant security breach.