CVE-2025-62204

Microsoft · Microsoft Multiple Products

A high-severity vulnerability has been identified in Microsoft SharePoint, which could allow an authorized attacker to remotely execute malicious code.

Executive summary

A high-severity vulnerability has been identified in Microsoft SharePoint, which could allow an authorized attacker to remotely execute malicious code. Successful exploitation could lead to a complete compromise of the SharePoint server, enabling the attacker to steal or alter sensitive corporate data, disrupt business operations, and potentially move to other systems within the network.

Vulnerability

This vulnerability is classified as Deserialization of Untrusted Data. The SharePoint application improperly validates user-supplied data when deserializing it, a process of reconstructing a data structure or object from a byte stream. An attacker with existing authorized access to the SharePoint environment can send a specially crafted serialized object over the network. When the server processes this malicious object, it can trigger the execution of arbitrary code with the privileges of the SharePoint application service account.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.0. A successful exploit could have a significant negative impact on the organization, leading to a complete compromise of the affected SharePoint server. Potential consequences include the theft or exfiltration of sensitive documents and intellectual property, unauthorized modification or deletion of critical business data, deployment of ransomware, and using the compromised server as a beachhead to launch further attacks against the internal corporate network.

Remediation

Immediate Action: The primary remediation is to apply the security updates released by Microsoft to all affected SharePoint servers immediately. Prioritize patching for internet-facing servers. After patching, review SharePoint ULS logs, IIS logs, and Windows Event Logs for any signs of compromise that may have occurred before the patch was applied.

Proactive Monitoring: Security teams should actively monitor for signs of exploitation. This includes looking for unusual process creation events from SharePoint worker processes (w3wp.exe), unexpected outbound network connections from SharePoint servers, and spikes in error messages related to serialization in application event logs. Configure network monitoring and Web Application Firewall (WAF) rules to detect and alert on anomalous serialized object payloads in traffic to the SharePoint server.

Compensating Controls: If immediate patching is not feasible, consider implementing temporary compensating controls. These include restricting access to the SharePoint application to only trusted IP addresses and users, enhancing WAF rules to block known malicious serialization patterns, and ensuring the SharePoint service accounts run with the principle of least privilege to limit the impact of a potential compromise.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity of this remote code execution vulnerability (CVSS 8.0), it is strongly recommended that the organization prioritizes the immediate deployment of the vendor-provided security updates. Although this CVE is not currently listed on the CISA KEV list, its impact and the widespread use of SharePoint make it a prime candidate for future inclusion and exploitation. Organizations should treat this as a critical priority for their patch management cycle and implement enhanced monitoring to detect any related malicious activity.