May 2025: Scripting Engine Memory Corruption Vulnerability
CVE-2025-30397 Published on May 13, 2025
Scripting Engine Memory Corruption Vulnerability
Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network.
Known Exploited Vulnerability
This Microsoft Windows Scripting Engine Type Confusion Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Windows Scripting Engine contains a type confusion vulnerability that allows an unauthorized attacker to execute code over a network via a specially crafted URL.
The following remediation steps are recommended / required by June 3, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Weakness Type
What is an Object Type Confusion Vulnerability?
The program allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
CVE-2025-30397 has been classified to as an Object Type Confusion vulnerability or weakness.
Products Associated with CVE-2025-30397
Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.
Affected Versions
Microsoft Windows 10 Version 1507:- Version 10.0.10240.0 and below 10.0.10240.21014 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8066 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7314 is affected.
- Version 10.0.19044.0 and below 10.0.19044.5854 is affected.
- Version 10.0.19045.0 and below 10.0.19045.5854 is affected.
- Version 10.0.22621.0 and below 10.0.22621.5335 is affected.
- Version 10.0.22631.0 and below 10.0.22631.5335 is affected.
- Version 10.0.22631.0 and below 10.0.22631.5335 is affected.
- Version 10.0.26100.0 and below 10.0.26100.4061 is affected.
- Version 6.1.7601.0 and below 6.1.7601.27729 is affected.
- Version 6.1.7601.0 and below 6.1.7601.27729 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23279 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23279 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25475 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25475 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22577 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22577 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8066 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8066 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7314 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7314 is affected.
- Version 10.0.20348.0 and below 10.0.20348.3692 is affected.
- Version 10.0.25398.0 and below 10.0.25398.1611 is affected.
- Version 10.0.26100.0 and below 10.0.26100.4061 is affected.
- Version 10.0.26100.0 and below 10.0.26100.4061 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.