Microsoft SharePoint Server Authentication Bypass (CVE-2025-53771)

medium Nessus Plugin ID 242983

Synopsis

A content collaboration application is affected by an authentication bypass vulnerability.

Description

The Microsoft SharePoint Server running on the remote host is affected by a remote code execution vulnerability:

- Improper limitation of a pathname to a restricted directory ('path traversal') in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network. (CVE-2025-53771)

Note that this plugin only tests the SharePoint site collections at /, /my, /sites, /teams, and /personal.

Solution

Microsoft has released KB5002753, KB5002754, KB5002759, KB5002760, and 5002768 to address this issue.

See Also

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771

http://www.nessus.org/u?7852d94f

http://www.nessus.org/u?8e7b779a

Plugin Details

Severity: Medium

ID: 242983

File Name: microsoft_sharepoint_CVE-2025-53771_direct.nbin

Version: 1.1

Type: remote

Family: Web Servers

Published: 7/29/2025

Updated: 7/29/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2025-53771

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Vulnerability Information

CPE: cpe:/a:microsoft:sharepoint_server

Exploited by Nessus: true

Patch Publication Date: 7/19/2025

Vulnerability Publication Date: 7/19/2025

Reference Information

CVE: CVE-2025-53771

IAVA: 2025-A-0535

MSFT: MS25-5002753, MS25-5002754, MS25-5002759, MS25-5002760, MS25-5002768

MSKB: 5002753, 5002754, 5002759, 5002760, 5002768