CVE-2025-59237
Published: 14 October 2025
Summary
CVE-2025-59237 is a high-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Microsoft Sharepoint Server. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 10.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation through vendor patches directly eliminates the deserialization vulnerability in Microsoft Office SharePoint.
Validating information inputs prior to deserialization prevents exploitation of untrusted data leading to remote code execution.
Memory protection safeguards such as DEP and ASLR mitigate the impact of remote code execution resulting from the deserialization flaw.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Deserialization vulnerability in Microsoft Office SharePoint enables remote code execution via exploitation of a public-facing web application, directly mapping to T1190.
NVD Description
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
Deeper analysisAI
CVE-2025-59237 is a deserialization of untrusted data vulnerability (CWE-502) in Microsoft Office SharePoint. Published on 2025-10-14T17:16:05.610, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.
An authorized attacker with low privileges (PR:L) can exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L) and no user interaction required (UI:N). Successful exploitation allows remote code execution, resulting in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged security scope (S:U).
The Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59237 provides guidance on mitigation and available patches.
Details
- CWE(s)