SharePoint ToolShell CVE-2025-53770 Exploitation - Web IIS

Detects access to vulnerable SharePoint components potentially being exploited in CVE-2025-53770 through IIS web server logs. CVE-2025-53770 is a zero-day vulnerability in SharePoint that allows remote code execution.

Sigma rule (View on GitHub)

 1title: SharePoint ToolShell CVE-2025-53770 Exploitation - Web IIS
 2id: 48d053db-6a56-4866-b60d-0975647050ed
 3status: experimental
 4description: |
 5    Detects access to vulnerable SharePoint components potentially being exploited in CVE-2025-53770 through IIS web server logs.
 6    CVE-2025-53770 is a zero-day vulnerability in SharePoint that allows remote code execution.    
 7references:
 8    - https://www.linkedin.com/posts/mauricefielenbach_sharepoint-incidentresponse-windowssecurity-activity-7352653907363303425-bL2f
 9    - https://research.eye.security/sharepoint-under-siege/
10    - https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/
11author: Swachchhanda Shrawan Poudel (Nextron Systems)
12date: 2025-07-21
13tags:
14    - attack.initial-access
15    - attack.t1190
16    - cve.2025-53770
17    - detection.emerging-threats
18logsource:
19    category: webserver # IIS web server logs
20detection:
21    selection_exploit_post:
22        cs-method: 'POST'
23        cs-uri-stem|contains: '/_layouts/15/ToolPane.aspx'
24        cs-uri-query|contains: 'DisplayMode=Edit&a=/ToolPane.aspx'
25    selection_exploit_get:
26        cs-method: 'GET'
27        cs-uri-stem|contains: '/_layouts/15/spinstall0.aspx'
28    selection_referer:
29        cs-referer|contains: '/_layouts/SignOut.aspx'
30    condition: 1 of selection_exploit_* and selection_referer
31falsepositives:
32    - Unknown
33level: medium

References

Related rules

to-top