CVE-2025-59237

Microsoft · Microsoft Multiple Products (Specifically Microsoft Office SharePoint)

A high-severity vulnerability has been identified in Microsoft SharePoint, tracked as CVE-2025-59237.

Executive summary

A high-severity vulnerability has been identified in Microsoft SharePoint, tracked as CVE-2025-59237. This flaw allows an authenticated attacker to execute malicious code on the server, potentially leading to a complete system compromise, data theft, and disruption of business operations. Due to the critical nature of this vulnerability, immediate patching is strongly recommended to prevent exploitation.

Vulnerability

This vulnerability is an insecure deserialization flaw. The SharePoint application fails to properly validate and sanitize user-supplied data when it is converted from a stream of bytes back into an object in memory. An attacker with valid user credentials can craft a malicious serialized object and send it to the application. When the application deserializes this malicious object, it can trigger the execution of arbitrary code with the privileges of the SharePoint application service account.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation could have a severe impact on the business. An attacker achieving remote code execution on a SharePoint server can exfiltrate sensitive data stored within the platform, including intellectual property, financial records, and personally identifiable information (PII). The compromised server could also be used as a foothold to pivot and move laterally across the corporate network, escalating the breach. Furthermore, the attacker could disrupt or disable the SharePoint service, impacting collaboration and productivity across the organization.

Remediation

Immediate Action: Apply the security updates provided by Microsoft across all affected SharePoint servers immediately. After patching, review SharePoint ULS logs, IIS logs, and Windows Event Logs for any signs of compromise that may have occurred prior to the update.

Proactive Monitoring: Security teams should actively monitor for indicators of compromise. Look for unusual child processes spawning from the SharePoint worker process (w3wp.exe), unexpected outbound network connections from SharePoint servers, and large or malformed POST requests in web traffic logs that may contain serialized payloads.

Compensating Controls: If immediate patching is not feasible, consider implementing the following controls:

  • Utilize a Web Application Firewall (WAF) with rules designed to detect and block common deserialization attack patterns.
  • Enforce the principle of least privilege for all SharePoint user accounts to limit the capabilities of an attacker who has already gained initial access.
  • Restrict network access to and from the SharePoint servers to only essential systems and ports.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score and the risk of remote code execution, this vulnerability poses a significant threat to the organization. We strongly recommend that all affected SharePoint servers be patched on an emergency basis. Although this vulnerability is not currently listed on the CISA KEV catalog and requires prior authentication, the low barrier to entry for an authenticated user makes it a critical priority. Organizations should treat this as a critical finding and expedite remediation efforts to prevent potential compromise.