Open Nav
Sign Up

Active Exploitation of Microsoft SharePoint RCE (CVE-2026-20963)

cve-2026-20963

Filip Dimitrov

March 20, 2026

A critical Microsoft SharePoint vulnerability, CVE-2026-20963, is now being actively exploited in the wild. The flaw enables remote code execution (RCE) and has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog.

The vulnerability stems from the deserialization of untrusted data, allowing attackers to execute arbitrary code on affected SharePoint servers with minimal interaction.

Given SharePoint’s role as a central collaboration and document management platform, successful exploitation can provide attackers with a high-value foothold into enterprise environments.

Technical Details

  • CVE: CVE-2026-20963
  • Severity: Critical (CVSS ~9.8)
  • Vulnerability Type: Deserialization of untrusted data
  • Impact: Remote Code Execution
  • Attack Vector: Network-based

The flaw allows attackers to inject malicious serialized objects, which are then processed by the SharePoint application. When deserialized, these objects can trigger execution of arbitrary commands on the underlying system.

In some scenarios, exploitation may be possible without authentication, significantly increasing the risk to internet-facing SharePoint servers.

Note: This flaw only impacts on-premises Microsoft SharePoint Server deployments and does not affect SharePoint Online (Microsoft 365), as the cloud service is managed and patched directly by Microsoft.

Observed Threat Activity

CISA has confirmed active exploitation in the wild and mandated remediation timelines for federal agencies.

Exploitation activity is ongoing, with unknown threat actors currently leveraging the vulnerability.

While attribution is not yet confirmed, historical SharePoint exploitation campaigns have been linked to state-sponsored espionage groups, initial access brokers, and ransomware operators

These actors typically target unpatched, internet-exposed SharePoint servers to gain initial access and expand further into the environment.

Mitigation & Recommendations

Organizations using on-premises Microsoft SharePoint Server should take immediate action:

  • Apply the January 2026 security updates addressing CVE-2026-20963
  • Restrict external access to SharePoint servers where possible
  • Validate that no unauthorized code or webshells are present

Stay Safe. Stay Secure

OP Innovate Research Team

Under Cyber Attack?

Fill out the form and we will contact you immediately.