Potential SharePoint ToolShell CVE-2025-53770 Exploitation - File Create
Detects the creation of file such as spinstall0.aspx which may indicate successful exploitation of CVE-2025-53770. CVE-2025-53770 is a zero-day vulnerability in SharePoint that allows remote code execution.
Sigma rule (View on GitHub)
1title: Potential SharePoint ToolShell CVE-2025-53770 Exploitation - File Create
2id: ba479447-721f-42a9-9af2-6dcd517bbdb3
3status: experimental
4description: |
5 Detects the creation of file such as spinstall0.aspx which may indicate successful exploitation of CVE-2025-53770.
6 CVE-2025-53770 is a zero-day vulnerability in SharePoint that allows remote code execution.
7references:
8 - https://research.eye.security/sharepoint-under-siege/
9 - https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/
10 - https://unit42.paloaltonetworks.com/microsoft-sharepoint-cve-2025-49704-cve-2025-49706-cve-2025-53770/
11author: Swachchhanda Shrawan Poudel (Nextron Systems)
12date: 2025-07-21
13modified: 2025-07-24
14tags:
15 - attack.initial-access
16 - attack.t1190
17 - cve.2025-53770
18 - detection.emerging-threats
19logsource:
20 product: windows
21 category: file_event
22detection:
23 selection:
24 TargetFilename|startswith:
25 - 'C:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\'
26 - 'C:\Program Files (x86)\Common Files\Microsoft Shared\Web Server Extensions\'
27 TargetFilename|contains:
28 - '\15\TEMPLATE\LAYOUTS\'
29 - '\16\TEMPLATE\LAYOUTS\'
30 TargetFilename|endswith:
31 - '\spinstall.aspx'
32 - '\spinstall?.aspx'
33 - '\debug_dev.js'
34 condition: selection
35falsepositives:
36 - Unknown
37level: critical
References
Related rules
- Potential SharePoint ToolShell CVE-2025-53770 Exploitation Indicators
- SharePoint ToolShell CVE-2025-53770 Exploitation - Web IIS
- Potential SAP NetViewer Webshell Command Execution
- Arcadyan Router Exploitations
- Potential Exploitation of CVE-2025-4427/4428 Ivanti EPMM Pre-Auth RCE