⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Disconnect public-facing versions of SharePoint Server that have reached their end-of-life (EOL) or end-of-service (EOS) to include SharePoint Server 2013 and earlier versions. For supported versions, please follow the mitigations according to CISA (URL listed below in Notes) and vendor instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.. Due date: 2025-07-23.
CVE-2025-49706
Severity
6.5MEDIUM
EPSS
71.6%
top 1.27%
CISA KEV
KEVRansomware
Added 2025-07-22
Due 2025-07-23
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJul 8
KEV addedJul 22
KEV dueJul 23
Latest updateDec 3
CISA Required Action: Disconnect public-facing versions of SharePoint Server that have reached their end-of-life (EOL) or end-of-service (EOS) to include SharePoint Server 2013 and earlier versions. For supported versions, please follow the mitigations according to CISA (URL listed below in Notes) and vendor instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
Description
Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:NExploitability: 3.9 | Impact: 2.5
Affected Packages5 packages
🔴Vulnerability Details
3💥Exploits & PoCs
2Nuclei▶
Microsoft SharePoint Server - Authentication Bypass
Metasploit▶
Microsoft SharePoint Server ToolPane Unauthenticated Remote Code Execution (aka ToolShell)↗