CVE-2025-59245
Published: 20 November 2025
Summary
CVE-2025-59245 is a critical-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Microsoft Sharepoint Online. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 21.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-5 (Security Alerts, Advisories, and Directives).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely remediation of the deserialization flaw in SharePoint Online through application of Microsoft patches and guidance.
Ensures receipt, dissemination, and implementation of security advisories from Microsoft's Security Response Center regarding this CVE.
Addresses CWE-502 by validating untrusted inputs before deserialization processing in SharePoint Online interactions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2025-59245 is an unauthenticated remote deserialization vulnerability in public-facing SharePoint Online enabling exploitation for initial access (T1190) and privilege escalation (T1068).
NVD Description
Microsoft SharePoint Online Elevation of Privilege Vulnerability
Deeper analysisAI
CVE-2025-59245 is an Elevation of Privilege vulnerability affecting Microsoft SharePoint Online. It has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is linked to CWE-502, which involves deserialization of untrusted data. The vulnerability was published on 2025-11-20T23:15:52.253.
The vulnerability enables exploitation over the network by unauthenticated attackers with low attack complexity and no requirement for user interaction. Successful exploitation results in high impacts to confidentiality, integrity, and availability, allowing attackers to elevate privileges within the affected SharePoint Online environment.
Microsoft provides guidance on this vulnerability through its Security Response Center update guide, available at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59245, which details recommended mitigations and patches.
Details
- CWE(s)