CVE-2025-53760: Microsoft SharePoint Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 7.1)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2025-Aug
Released
2025-08-12
Last Updated
2025-10-16
EPSS Score
0.33% (percentile: 56.0%)

Description

Server-side request forgery (ssrf) in Microsoft Office SharePoint allows an authorized attacker to elevate privileges over a network.

FAQ

According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), and some loss of integrity (I:L), but no loss of availability (A:N). What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could view sensitive information, a token in this scenario (Confidentiality), and make some changes to disclosed information (Integrity), but they would not be able to affect Availability. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain the privileges of the compromised user. I am running SharePoint Server 2016. Do the updates for SharePoint Enterprise Server 2016 also apply to the version I am running? Yes. The same KB number applies to both SharePoint Server 2016 and SharePoint Enterprise Server 2016. Customers running either version should install the security update to be protected from this vulnerability.

Affected Products (3)

Microsoft Office

  • Microsoft SharePoint Enterprise Server 2016
  • Microsoft SharePoint Server 2019
  • Microsoft SharePoint Server Subscription Edition

Security Updates (3)

Acknowledgments

<a href="https://www.linkedin.com/in/pszafirowski/">Paweł Szafirowski (Proximus)</a> with <a href="https://saphir.berlin/">Saphir CyberSecurity</a>

Revision History

  • 2025-08-12: Information published.
  • 2025-08-13: Added an acknowledgement. This is an informational change only.
  • 2025-10-16: Revised the packages to include Download Center ID for this vulnerability.