Jun 2025: Internet Shortcut Files Remote Code Execution Vulnerability
CVE-2025-33053 Published on June 10, 2025
Internet Shortcut Files Remote Code Execution Vulnerability
External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network.
Known Exploited Vulnerability
This Web Distributed Authoring and Versioning (WebDAV) External Control of File Name or Path Vulnerabilit vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Web Distributed Authoring and Versioning (WebDAV) contains an external control of file name or path vulnerability. This vulnerability could allow an unauthorized attacker to execute code over a network. This vulnerability could affect various products that implement WebDAV, including but not limited to Microsoft Windows.
The following remediation steps are recommended / required by July 1, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Weakness Type
External Control of File Name or Path
The software allows user input to control or influence paths or file names that are used in filesystem operations.
Products Associated with CVE-2025-33053
Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.
Affected Versions
Microsoft Windows 10 Version 1507:- Version 10.0.10240.0 and below 10.0.10240.21034 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8148 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7434 is affected.
- Version 10.0.19044.0 and below 10.0.19044.5965 is affected.
- Version 10.0.19045.0 and below 10.0.19045.5965 is affected.
- Version 10.0.22621.0 and below 10.0.22621.5472 is affected.
- Version 10.0.22631.0 and below 10.0.22631.5472 is affected.
- Version 10.0.22631.0 and below 10.0.22631.5472 is affected.
- Version 10.0.26100.0 and below 10.0.26100.4349 is affected.
- Version 6.1.7601.0 and below 6.1.7601.27769 is affected.
- Version 6.1.7601.0 and below 6.1.7601.27769 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23351 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23351 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25522 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25522 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22620 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22620 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8148 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8148 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7434 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7434 is affected.
- Version 10.0.20348.0 and below 10.0.20348.3807 is affected.
- Version 10.0.25398.0 and below 10.0.25398.1665 is affected.
- Version 10.0.26100.0 and below 10.0.26100.4349 is affected.
- Version 10.0.26100.0 and below 10.0.26100.4349 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.