PatchDay Alert

Editorial coverage · CVE-2025-49704

Patched on time. Out of patches in July.

Microsoft shipped emergency fixes for ToolShell's code-injection component on July 21, 2025. SharePoint Server 2016 and 2019 reach end of support on July 14, 2026. The patch on this CVE landed on time. The next chain on the same endpoint will arrive without one.

Editorial CVE · 3 min read By The Field Notes Desk · Field Notes

What we say

The patch shipped. That part worked. The July 21 out-of-band update replaced the deserialization blocklist with an allowlist, the AMSI integration got tightened, the KB articles went up, and the operators who applied them on schedule closed the door. On the bug itself, the chain ends. On the product the bug lives in, the clock is the part that matters now.

SharePoint Server 2016 and SharePoint Server 2019 reach end of extended support on July 14, 2026. That is sixty days from this writing. After that date Microsoft does not ship security updates for either product through the public channel. There is no announced Extended Security Updates program for on-premises SharePoint. The Subscription Edition, introduced in 2021 as the modern on-prem track, is the explicit upgrade path; for organizations that have not started the migration, the path on offer is “buy SharePoint Subscription Edition or move to M365.” Both options require a real migration project. Neither is the “apply this patch and reboot” pattern the same operators just executed on July 21.

The pattern this lands inside is older than ToolShell. Long-lived application platforms — Exchange, SharePoint, Confluence, GitLab on- prem — produce a critical-rated CVE on a public-facing endpoint on a roughly annual cadence. The endpoint that processed the attacker- controlled deserialization input on /_layouts/15/ToolPane.aspx does not stop being attacker-reachable when the product hits end of support. It stops being patchable. SharePoint Server 2013, end of extended support April 11, 2023, never received a ToolShell patch; CISA’s guidance for 2013 farms in July 2025 was disconnect from the internet, which is the guidance every EOS application gets when the next chain lands. The operators running 2013 in July 2025 were not neglectful — they were on a product that ran out of patches twenty- seven months earlier. The operators running 2016 or 2019 in August 2026 will be in the same posture.

The compliance dimension is the part most likely to force the conversation. PCI DSS Requirement 6.3.3 puts a one-month clock on critical security patches; an EOS product has no patches, so the clock cannot be satisfied by patching. FedRAMP control SI-2 reads the same way against the authorization boundary. SOX 404 ITGC reviews that test patching as a control narrative will produce a finding when the underlying product is no longer receiving updates. None of this is theoretical for 2016 or 2019 after July 14. The QSA, the 3PAO, and the SOX auditor all arrive in the second half of the year with the same question: what is the plan for the SharePoint farm that just lost its patch supply.

The narrow lesson is product-specific: the migration plan is the remediation now, not the next emergency patch. The wider one is that on a long-lived application platform with a near-term EOS date, the patch you applied this month is one of the last ones on offer. The runbook that says “patch when the vendor ships a fix” is the right runbook until the vendor stops shipping fixes. After that the runbook is the migration plan, and the migration plan is on a different calendar than the one the patch queue lives on.

What NVD says

CWE-94 — improper control of generation of code. CVSS 3.1 base 8.8, vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. Remote code execution against on-premises Microsoft SharePoint Server 2016, 2019, and Subscription Edition through a code-injection path on `/_layouts/15/ToolPane.aspx`. NVD names the bug and the affected products correctly. The record carries no field for vendor support state — whether the affected products will still be receiving security updates the next time the same endpoint family produces a CVE. For SharePoint 2016 and 2019 the answer becomes no on July 14, 2026.

NVD entry →

What the vendor says

Microsoft's MSRC entry for CVE-2025-49704 names the bug as a remote code execution vulnerability in on-premises SharePoint Server and shipped the original fix in the July 8, 2025 update; the patch was bypassed by CVE-2025-53770 and replaced in the July 21 out-of-band update. The advisory carries the patch metadata. It does not carry the support-lifecycle context — SharePoint Server 2013 reached end of extended support on April 11, 2023 and never received a ToolShell patch; SharePoint Server 2016 and 2019 reach end of extended support on July 14, 2026. After that date, Microsoft's published policy is no security updates outside paid Extended Security Updates programs, and ESU coverage for on-premises SharePoint is not on the public roadmap.

Compliance impact

FEDRAMP
FedRAMP-authorized environments running SharePoint Server 2016 or 2019 will lose the upstream patch supply on July 14, 2026. Authorization boundaries that include an EOS application require a POA&M with a documented mitigation; the auditable path forward is migration to SharePoint Subscription Edition or M365, or removal of the application from the boundary. CVE-2025-49704 is patched today. The control narrative that says 'we patch on schedule' has a sixty-day shelf life on this product.
PCI DSS
Requirement 6.3.3 of PCI DSS v4.0 requires that critical security patches be installed within one month of release. After July 14, 2026, no patches will be released for SharePoint Server 2016 or 2019 in the standard support channel. A SharePoint farm that processes or stores cardholder data (account-management workflows, vendor onboarding documents, dispute evidence) cannot satisfy Requirement 6.3.3 against a product that has no patches. QSAs will accept compensating controls for a finite window; the long-term remediation is to move the workload off the EOS version.

Sources

Every source on this list has been read by the editorial team. We do not cite something we have not opened.

Deeper read

Coverage in PatchDay Alert

View all posts tagged #cve-2025-49704 →

One email, every weekday morning.

You're in. Check your inbox.

Get the digest

Free. Weekday mornings. Plain English CVE triage.

Check your inbox to confirm.