PatchSiren cyber security CVE debrief
CVE-2025-49704 Microsoft CVE debrief
CVE-2025-49704 is a Microsoft SharePoint code injection vulnerability that CISA added to its Known Exploited Vulnerabilities catalog on 2025-07-22. CISA marks the issue as known to be used in ransomware campaigns and sets a remediation due date of 2025-07-23. Because it is a KEV-listed issue affecting SharePoint, organizations should treat exposure of public-facing deployments as urgent and follow CISA and Microsoft guidance immediately.
- Vendor
- Microsoft
- Product
- SharePoint
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2025-07-22
- Original CVE updated
- 2025-07-22
- Advisory published
- 2025-07-22
- Advisory updated
- 2025-07-22
Who should care
SharePoint administrators, vulnerability management teams, security operations, incident responders, and organizations running public-facing Microsoft SharePoint Server deployments. Priority is especially high for any environment running unsupported SharePoint versions or internet-exposed instances.
Technical summary
The supplied corpus identifies CVE-2025-49704 as a Microsoft SharePoint code injection vulnerability. The CISA KEV entry records the product as Microsoft SharePoint, notes known ransomware campaign use, and points defenders to CISA mitigation guidance, Microsoft’s security blog, and the Microsoft Security Response Center advisory. No CVSS score was provided in the supplied data.
Defensive priority
High. CISA has already listed the vulnerability in KEV with a next-day due date, which is a strong indicator of active exploitation risk and urgent remediation needs.
Recommended defensive actions
- Disconnect public-facing SharePoint Server versions that are end-of-life or end-of-service, including SharePoint Server 2013 and earlier.
- For supported SharePoint versions, follow Microsoft’s mitigation and update instructions immediately.
- Review the CISA alert and Microsoft guidance linked in the KEV entry before making remediation changes.
- Inventory all SharePoint deployments, identify internet-facing instances, and confirm whether they are supported and fully patched.
- Treat the issue as urgent if the environment is exposed to the internet or if compensating controls are not available.
- Use incident-response processes to check for signs of compromise on any potentially affected SharePoint servers.
Evidence notes
All statements are limited to the supplied CVE/KEV metadata and the official links listed in the corpus. The only timing facts used are the CVE/publication date of 2025-07-22, CISA KEV addition on 2025-07-22, and KEV due date of 2025-07-23. No CVSS score was provided in the source data.
Official resources
-
CVE-2025-49704 CVE record
CVE.org
-
CVE-2025-49704 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Disconnect public-facing versions of SharePoint Server that have reached their end-of-life (EOL) or end-of-service (EOS) to include SharePoint Server 2013 and earlier versions. For supported versions, please follow the m
-
Source item URL
cisa_kev
Publicly disclosed and added to CISA’s Known Exploited Vulnerabilities catalog on 2025-07-22; CISA set a remediation due date of 2025-07-23.