Home Microsoft CVE-2025-30378
Back to Microsoft

CVE-2025-30378

Microsoft Office SharePoint

Microsoft CVSS 7 Updated March 12, 2026

Executive Risk Summary

"A critical vulnerability in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally through deserialization of untrusted data, potentially leading to system compromise. This vulnerability poses a significant risk to SharePoint servers, as it can be exploited without authentication, allowing attackers to run malicious code with elevated privileges."

Operational Audit Arsenal

Target Type Executable
Target Asset winword.exe
Standard Path %ProgramFiles%\Microsoft Office\Root\Office16
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: winword.exe (Executable)
$Targets = 'winword.exe'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

SharePoint services

Internal Work Notes

Urgent: Apply patch for CVE-2025-30378 to prevent code execution vulnerability in Microsoft Office SharePoint

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Microsoft Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.