Uncategorized

New “ToolShell” Exploit Chain Attacking SharePoint Servers to Gain Complete Control

Organizations about an active campaign targeting Microsoft SharePoint servers using a sophisticated exploit chain dubbed “ToolShell.”

The attacks combine previously patched vulnerabilities with new zero-day exploits to achieve complete remote control of enterprise systems, prompting CISA to add the associated CVEs to its catalog of Known Exploited Vulnerabilities.

The ToolShell campaign leverages a dangerous combination of four vulnerabilities affecting Microsoft SharePoint Enterprise Server 2016, SharePoint Server 2019, and SharePoint Server Subscription Edition.

Threat actors are chaining together two previously patched vulnerabilities (CVE-2025-49704 and CVE-2025-49706) with two fresh zero-day variants (CVE-2025-53770 and CVE-2025-53771) to achieve remote code execution capabilities.

The attack begins with simple reconnaissance commands, including CURL and PowerShell scripts designed to upload system configuration information to remote servers controlled by the attackers.

This initial probing allows threat actors to map target environments and identify vulnerable SharePoint installations before launching more sophisticated payloads.

Security experts note that exploitation in the wild is accelerating beyond the known attack vector using “spinstall0.aspx,” indicating that multiple threat actors have weaponized these vulnerabilities.

“spinstall0.aspx” exploitation.

The critical severity rating reflects the potential for attackers to gain complete administrative control over affected SharePoint servers, which often contain sensitive corporate data and serve as gateways to broader network infrastructure.

ToolShell Exploit Chain

Once initial access is gained, attackers deploy sophisticated web shells designed for long-term persistence and remote command execution.

The primary tool, dubbed “GhostWebShell,” represents a significant advancement in post-exploitation techniques specifically tailored for SharePoint environments.

GhostWebShell operates by embedding a Base64-encoded ASP.NET page that exposes a command parameter allowing attackers to execute arbitrary system commands remotely.

The malicious code captures both standard output and error messages, providing attackers with interactive console access over HTTP connections. This effectively transforms the compromised SharePoint server into a remotely accessible command shell.

Decoded content.

To evade detection in precompiled SharePoint environments, the web shell employs advanced techniques including temporary manipulation of internal BuildManager flags through reflection.

It bypasses standard application precompilation checks and registers a custom VirtualPathProvider, enabling fileless-style operation by injecting malicious pages from memory rather than disk-based files.

Data Harvesting Capabilities

The attack toolkit includes a second component called “KeySiphon,” designed for extensive reconnaissance and credential harvesting.

FortiGuard Labs has released IPS signatures and blocked known indicators of compromise, while security teams should prioritize log review and network monitoring to identify potential intrusions.

This module systematically fingerprints compromised systems, collecting detailed information about logical drives, machine specifications, system directories, CPU configurations, uptime data, user accounts, and operating system versions.

More critically, KeySiphon extracts sensitive cryptographic keys from SharePoint applications by accessing the private “MachineKeySection.GetApplicationConfig()” method.

These stolen validation and decryption keys enable attackers to forge authentication tokens, manipulate ViewState data for deserialization attacks, and decrypt protected information within the application domain.

Organizations are urged to immediately apply available security patches and implement layered detection mechanisms.

The active exploitation of these vulnerabilities demonstrates that SharePoint servers remain high-value targets requiring immediate attention from enterprise security teams.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Ethan Brooks

Ethan Brooks is a Senior cybersecurity journalist passionate about threat intelligence and data privacy. His work highlights cyber attacks, hacking, security culture, and cybercrime with The Cyber News.

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago