CVE-2025-21400: Microsoft SharePoint Server Remote Code Execution Vulnerability
Overview
- Severity
- High (CVSS 8)
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
- Category
- Remote Code Execution
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- More Likely
- Patch Tuesday
- 2025-Feb
- Released
- 2025-02-11
- EPSS Score
- 1.87% (percentile: 83.1%)
FAQ
According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.
How could an attacker exploit the vulnerability?
In a network-based attack, an attacker authenticated as at least a Site Owner, could write arbitrary code to inject and execute code remotely on the SharePoint Server.
Affected Products (3)
Microsoft Office
- Microsoft SharePoint Enterprise Server 2016
- Microsoft SharePoint Server 2019
- Microsoft SharePoint Server Subscription Edition
Security Updates (3)
Acknowledgments
cjm00n with Cyber Kunlun & Zhiniang Peng
Revision History
- 2025-02-11: Information published.