Microsoft SharePoint Server 2019 RCE: When Your Documents Can Hack Back!
Discover how to exploit Microsoft SharePoint Server 2019 for remote code execution using unauthenticated unsafe deserialization. This step-by-step guide is perfect for educational and authorized security testing purposes. Learn how to execute the SharePoint RCE exploit like a pro!

Hot Take:
Ah, SharePoint, the gift that keeps on giving. Just when you thought your data was safe behind its walls, along comes a new exploit, armed with a toolpane and a thirst for chaos. Who would have guessed that a seemingly innocent ExcelDataSet could moonlight as a villain in this cybersecurity drama?
Key Points:
- Microsoft SharePoint Server 2019 is facing a new Remote Code Execution (RCE) exploit.
- The exploit is linked to an unsafe deserialization issue in SharePoint’s ToolPane.aspx.
- It involves a payload that leverages the Scorecard:ExcelDataSet control.
- Exploit demonstration by Agampreet Singh highlights the vulnerability.
- This issue is tracked as CVE-2025-53770.
Already a member? Log in here