CVE-2025-33053

ENISA EUVD: EUVD-2025-17721 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 3, 2026 3 articles Published: 2025-06-10

EPSS Score

Source: FIRST.org · 2026-05-23
47.02%
probability
This CVE has a 47.02% probability of being exploited in the next 30 days.
0% Top 97.7th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
8.8
HIGH
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Functional
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

Description

NVD
External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network.

Affected Products

Microsoft
Windows 10 Version 1507
10.0.10240.0
Microsoft
Windows 10 Version 1607
10.0.14393.0
Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows 10 Version 21H2
10.0.19044.0
Microsoft
Windows 10 Version 22H2
10.0.19045.0

Attack Intelligence

Google Project Zero

Patched
June 10, 2025
Reported by
Alexandra Gofman and David Driker (Check Point Research)
Root Cause Analysis
???

Exploits & PoC

DevBuiHieu/CVE-2025-33053-Proof-Of-Concept

CVE-2025-33053 Proof Of Concept (PoC)

63 2025-06-17
kra1t0/CVE-2025-33053-WebDAV-RCE-PoC-and-C2-Concept

Proof-of-Concept for CVE-2025-33053 Exploiting WebDAV with .url file delivery to demonstrate realistic remote code execution. Includes a decoy PDF pa

3 2025-06-19
TheTorjanCaptain/CVE-2025-33053-Checker-PoC

CVE-2025-33053 Checker and PoC

1 2025-06-18
4n4s4zi/CVE-2025-33053_PoC

POC exploit for CVE-2025-33053 (external control of file execution path in URL file)

1 2025-08-23
Cyberw1ng/CVE-2025-33053-POC

POC for CVE-2025-33053 WebDav Exploit, demonstrating how the vulnerability can be triggered in a real environment. This repository focuses on hands-on

0 2025-12-18
5 repos — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
82%
EPSS 47.02%
CVSS v3.1 8.8
Mentions 3
Last Seen Jun 11, 2025

CNA Information

CNA Assigner
microsoft
CNA Title
Internet Shortcut Files Remote Code Execution Vulnerability

Analyst Note

CVE-2025-33053 is confirmed with high severity (CVSS 8.8) affecting Windows 10, documented in Google Project Zero, and supported by evidence of active exploitation for malware delivery via WebDAV. The single article reference and absence from CISA KEV catalog slightly temper confidence, but the combination of authoritative disclosure and real-world attack evidence substantiates the confirmed status.

Threat Actors 18

APT 29
apt_group Information theft and espionage 🇷🇺 RU
Cobalt
apt_group Financial crime 🇷🇺 RU
APT 28
apt_group Information theft and espionage 🇷🇺 RU
Hacking Team
apt_group 🇮🇹 IT
Avalanche
apt_group 🇺🇦 UA
Returned Libra
apt_group 🇨🇳 CN
APT 22
apt_group Information theft and espionage 🇨🇳 CN
APT 6
apt_group Information theft and espionage 🇨🇳 CN
Red Dev 17
apt_group 🇨🇳 CN
Stealth Falcon
apt_group Information theft and espionage 🇦🇪 AE
Red October
apt_group 🇷🇺 RU
Operation Red Signature
apt_group Information theft and espionage 🇨🇳 CN
Patched Lightning
apt_group 🇬🇭 GH
Operation Digital Eye
apt_group Information theft and espionage 🇨🇳 CN
Shadow Network
apt_group Information theft and espionage 🇨🇳 CN
Mana Team
apt_group 🇨🇳 CN
APT 5
apt_group Information theft and espionage 🇨🇳 CN
Storm-2460
apt_group 🇷🇺 RU

Triage Info

Decided atMar 03, 2026
Published DateJun 10, 2025