{"id":"CVE-2025-33053","details":"External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network.","modified":"2026-05-04T08:50:19.432474Z","published":"2025-06-10T17:22:18.853Z","withdrawn":"2026-05-04T08:50:19.432474Z","references":[{"type":"WEB","url":"https://therecord.media/microsoft-cisa-zero-day-turkish-defense-org"},{"type":"WEB","url":"https://www.darkreading.com/vulnerabilities-threats/stealth-falcon-apt-exploits-microsoft-rce-zero-day-mideast"},{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-33053"},{"type":"WEB","url":"https://www.bleepingcomputer.com/news/security/stealth-falcon-hackers-exploited-windows-webdav-zero-day-to-drop-malware/"},{"type":"WEB","url":"https://www.theregister.com/2025/06/10/microsoft_patch_tuesday_june/"},{"type":"ADVISORY","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053"},{"type":"EVIDENCE","url":"https://www.vicarius.io/vsociety/posts/cve-2025-33053-detection-script-remote-code-execution-vulnerability-in-microsoft-webdav"},{"type":"EVIDENCE","url":"https://www.vicarius.io/vsociety/posts/cve-2025-33053-mitigation-script-remote-code-execution-vulnerability-in-microsoft-webdav"},{"type":"EVIDENCE","url":"https://research.checkpoint.com/2025/stealth-falcon-zero-day/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"10.0.10240.21034"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.10240.21034"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.14393.8148"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.14393.8148"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.17763.7434"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.17763.7434"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.19044.5965"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.19044.5965"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.19044.5965"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.19045.5965"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.19045.5965"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.19045.5965"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.22621.5472"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.22621.5472"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.22631.5472"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.22631.5472"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.26100.4270"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.26100.4270"}]},{"events":[{"introduced":"0"},{"last_affected":"r2-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"r2"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.14393.8148"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.17763.7434"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.20348.3745"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.25398.1665"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.26100.4270"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-33053.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}