CVE-2025-53771
ENISA EUVD: EUVD-2025-22040 ↗
✓ Confirmed 0-Day
Triaged: March 5, 2026
11 articles
Published: 2025-07-20
EPSS Score
Source: FIRST.org · 2026-05-23
44.97%
probability
This CVE has a 44.97% probability
of being exploited in the next 30 days.
0%
Top 97.6th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)6.5
MEDIUM
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Temporal
Exploit Code Maturity
Proof-of-Concept
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C
Description
NVDImproper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.
Affected Products
Microsoft
Microsoft SharePoint Enterprise Server 2016
16.0.0
Microsoft
Microsoft SharePoint Server 2019
16.0.0
Microsoft
Microsoft SharePoint Server Subscription Edition
16.0.0
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771
vendor-advisory
patch
Signal Intelligence
Confidence
85%
EPSS
44.97%
CVSS v3.1
6.5
Mentions
11
Last Seen
Jul 24, 2025
CNA Information
CNA Assigner
microsoft
CNA Title
Microsoft SharePoint Server Spoofing Vulnerability
Analyst Note
Article [2] explicitly states 'Microsoft SharePoint zero-day exploited in RCE attacks, no patch available,' confirming active exploitation before patch availability. Article [1] references emergency patches for exploited SharePoint RCE flaws. The 2025 CVE date with concurrent exploitation reports and explicit zero-day language in authoritative sources meets confirmation criteria.
Threat Actors 41
Cobalt
apt_group
Financial crime
🇷🇺 RU
APT 28
apt_group
Information theft and espionage
🇷🇺 RU
Vicious Panda
apt_group
Information theft and espionage
🇨🇳 CN
Hacking Team
apt_group
🇮🇹 IT
SCATTERED SPIDER
apt_group
Financial crime
🇺🇸 US
The Shadow Brokers
apt_group
🇷🇺 RU
APT3
apt_group
Information theft and espionage
🇨🇳 CN
Infy
apt_group
Information theft and espionage
🇮🇷 IR
Group 27
apt_group
Information theft and espionage
🇨🇳 CN
[Unnamed group]
apt_group
🇨🇳 CN
FamousSparrow
apt_group
Information theft and espionage
🇨🇳 CN
Earth Estries
apt_group
Information theft and espionage
🇨🇳 CN
HAFNIUM
apt_group
Information theft and espionage
🇨🇳 CN
APT31
apt_group
Information theft and espionage
🇨🇳 CN
Earth Alux
apt_group
Information theft and espionage
🇨🇳 CN
APT 22
apt_group
Information theft and espionage
🇨🇳 CN
Flax Typhoon
apt_group
Information theft and espionage
🇨🇳 CN
APT 6
apt_group
Information theft and espionage
🇨🇳 CN
UNC215
apt_group
Information theft and espionage
🇨🇳 CN
Water Bakunawa
apt_group
🇷🇺 RU
Bitwise Spider
apt_group
Financial gain
🇷🇺 RU
The White Company
apt_group
Information theft and espionage
🇨🇳 CN
Radio Panda
apt_group
Information theft and espionage
🇨🇳 CN
Circles
apt_group
Global
Pat Bear
apt_group
🇸🇾 SY
Operation Red Signature
apt_group
Information theft and espionage
🇨🇳 CN
Operation Digital Eye
apt_group
Information theft and espionage
🇨🇳 CN
Unnamed Actor
apt_group
🇨🇳 CN
Shadow Network
apt_group
Information theft and espionage
🇨🇳 CN
Mana Team
apt_group
🇨🇳 CN
Iron Group
apt_group
Information theft and espionage
🇨🇳 CN
Redfly
apt_group
🇨🇳 CN
APT 5
apt_group
Information theft and espionage
🇨🇳 CN
Cyber Alliance
apt_group
🇺🇦 UA
WildCard
apt_group
Information theft and espionage
🇵🇸 PS
Storm-2460
apt_group
🇷🇺 RU
Dust Storm
apt_group
Information theft and espionage
🇨🇳 CN
Electric Panda
apt_group
🇨🇳 CN
Storm-0558
apt_group
Information theft and espionage
🇨🇳 CN
Dark Partners
apt_group
Union Panda
apt_group
🇨🇳 CN
Triage Info
Decided atMar 05, 2026
Published DateJul 20, 2025