{"id":4994,"date":"2025-07-22T10:59:24","date_gmt":"2025-07-22T08:59:24","guid":{"rendered":"https:\/\/ai-explorer.io\/blog\/?p=4994"},"modified":"2026-04-18T05:31:24","modified_gmt":"2026-04-18T03:31:24","slug":"vulnerabilite-sharepoint-critique-exploitee-mondialement","status":"publish","type":"post","link":"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/","title":{"rendered":"Vuln\u00e9rabilit\u00e9 SharePoint critique exploit\u00e9e mondialement"},"content":{"rendered":"\n<p>Une <strong>vuln\u00e9rabilit\u00e9 SharePoint<\/strong> critique, identifi\u00e9e sous le code CVE-2025-53770, fait l\u2019objet d\u2019une exploitation massive \u00e0 l\u2019\u00e9chelle mondiale, mettant en danger les serveurs <strong>SharePoint<\/strong> sur site. Avec un score de gravit\u00e9 de 9,8 sur 10, cette faille permet \u00e0 des attaquants non authentifi\u00e9s d\u2019ex\u00e9cuter du code \u00e0 distance, compromettant des donn\u00e9es sensibles et des infrastructures critiques.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-une-faille-zero-day-aux-consequences-graves\">Une faille zero-day aux cons\u00e9quences graves<\/h2>\n\n\n\n<p>La <strong>vuln\u00e9rabilit\u00e9 SharePoint<\/strong> CVE-2025-53770, d\u00e9couverte r\u00e9cemment, exploite une faiblesse dans la d\u00e9s\u00e9rialisation de donn\u00e9es non fiables sur les serveurs <strong>SharePoint<\/strong> sur site. Cette faille permet aux attaquants d\u2019acc\u00e9der sans authentification aux syst\u00e8mes expos\u00e9s sur Internet, leur offrant un contr\u00f4le total sur les fichiers, les configurations internes et l\u2019ex\u00e9cution de code arbitraire. Selon Microsoft, cette vuln\u00e9rabilit\u00e9 ne touche pas les services cloud comme <strong>SharePoint Online<\/strong> ou Microsoft 365, mais uniquement les installations sur site.<\/p>\n\n\n\n<p>En outre, les attaquants utilisent cette faille dans une attaque baptis\u00e9e <strong>ToolShell<\/strong>, qui d\u00e9ploie des portes d\u00e9rob\u00e9es (backdoors) et extrait des cl\u00e9s cryptographiques, telles que les <strong>MachineKeys ASP.NET<\/strong>, permettant un acc\u00e8s persistant m\u00eame apr\u00e8s l\u2019application de correctifs. Cette capacit\u00e9 \u00e0 maintenir un acc\u00e8s furtif rend la menace particuli\u00e8rement dangereuse.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-une-exploitation-massive-et-rapide\">Une exploitation massive et rapide<\/h2>\n\n\n\n<p>Les premi\u00e8res attaques ont \u00e9t\u00e9 d\u00e9tect\u00e9es d\u00e8s le 18 juillet 2025, avec des vagues d\u2019exploitation signal\u00e9es par la firme de <a href=\"https:\/\/ai-explorer.io\/blog\/vie-privee-donnees-personnelles-ia\/\" title=\"Pensez \u00e0 votre vie priv\u00e9e avant de partager vos donn\u00e9es personnelles avec l\u2019IA\" target=\"_blank\" rel=\"noopener\" data-wpil-monitor-id=\"458\">s\u00e9curit\u00e9 Eye Security<\/a>. En scannant plus de 8 000 serveurs <strong>SharePoint<\/strong> accessibles publiquement, les chercheurs ont identifi\u00e9 des dizaines de syst\u00e8mes compromis, incluant des organisations gouvernementales, des universit\u00e9s, des entreprises \u00e9nerg\u00e9tiques et des agences f\u00e9d\u00e9rales am\u00e9ricaines.<\/p>\n\n\n\n<p>Par ailleurs, la <strong>vuln\u00e9rabilit\u00e9 SharePoint<\/strong> est une variante de CVE-2025-49706, partiellement corrig\u00e9e lors de la mise \u00e0 jour de juillet 2025 de Microsoft. Cependant, les attaquants ont contourn\u00e9 ces correctifs, exploitant une nouvelle cha\u00eene d\u2019attaque pr\u00e9sent\u00e9e lors du concours Pwn2Own \u00e0 Berlin en mai 2025. Cette rapidit\u00e9 d\u2019adaptation illustre la sophistication des cybercriminels face aux mesures de s\u00e9curit\u00e9 traditionnelles.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-consequences-pour-les-organisations\">Cons\u00e9quences pour les organisations<\/h2>\n\n\n\n<p>L\u2019impact de cette <strong>vuln\u00e9rabilit\u00e9 SharePoint<\/strong> est consid\u00e9rable. Les attaquants peuvent :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Acc\u00e9der aux donn\u00e9es sensibles<\/strong> : Les serveurs compromis permettent l\u2019exfiltration de fichiers, de configurations internes et de jetons d\u2019authentification.<\/li>\n\n\n\n<li><strong>D\u00e9ployer des portes d\u00e9rob\u00e9es<\/strong> : Le backdoor <strong>ToolShell<\/strong> garantit un acc\u00e8s continu, m\u00eame apr\u00e8s l\u2019application de correctifs, si les cl\u00e9s cryptographiques ne sont pas renouvel\u00e9es.<\/li>\n\n\n\n<li><strong>\u00c9tendre les attaques<\/strong> : Les jetons vol\u00e9s offrent un acc\u00e8s privil\u00e9gi\u00e9 \u00e0 d\u2019autres syst\u00e8mes connect\u00e9s, comme Teams ou OneDrive, amplifiant les dommages potentiels.<\/li>\n<\/ul>\n\n\n\n<p>En cons\u00e9quence, des organisations dans des secteurs critiques, tels que la sant\u00e9, l\u2019\u00e9ducation et le gouvernement, sont particuli\u00e8rement vuln\u00e9rables. La Cybersecurity and Infrastructure Security Agency (CISA) a ajout\u00e9 la faille \u00e0 son catalogue des vuln\u00e9rabilit\u00e9s exploit\u00e9es, imposant aux agences f\u00e9d\u00e9rales am\u00e9ricaines de prendre des mesures imm\u00e9diates d\u2019ici le 21 juillet 2025.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-mesures-de-protection-immediates\">Mesures de protection imm\u00e9diates<\/h2>\n\n\n\n<p>Face \u00e0 cette menace, Microsoft et les experts en <strong>cybers\u00e9curit\u00e9<\/strong> recommandent plusieurs actions urgentes :<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-appliquer-les-correctifs-disponibles\">1. Appliquer les correctifs disponibles<\/h3>\n\n\n\n<p>Microsoft a publi\u00e9 des mises \u00e0 jour d\u2019urgence pour <strong>SharePoint Subscription Edition<\/strong> et <strong>SharePoint Server 2019<\/strong> (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-53770\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-53770<\/a> et <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-53771\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-53771<\/a>). Les utilisateurs de <strong>SharePoint Server 2016<\/strong> doivent activer l\u2019interface de num\u00e9risation antimalware (AMSI) en attendant un correctif.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-renouveler-les-cles-cryptographiques\">2. Renouveler les cl\u00e9s cryptographiques<\/h3>\n\n\n\n<p>Les organisations doivent renouveler les <strong>MachineKeys ASP.NET<\/strong> de leurs serveurs <strong>SharePoint<\/strong> et red\u00e9marrer le serveur IIS pour emp\u00eacher un acc\u00e8s persistant. Microsoft fournit des instructions via la commande PowerShell Update-SPMachineKey.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-deconnecter-les-serveurs-exposes\">3. D\u00e9connecter les serveurs expos\u00e9s<\/h3>\n\n\n\n<p>Si l\u2019application des correctifs ou d\u2019AMSI n\u2019est pas possible, il est conseill\u00e9 de d\u00e9connecter les serveurs <strong>SharePoint<\/strong> d\u2019Internet pour limiter les risques.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-surveiller-les-indicateurs-de-compromission\">4. Surveiller les indicateurs de compromission<\/h3>\n\n\n\n<p>Les administrateurs doivent v\u00e9rifier la pr\u00e9sence de fichiers suspects, comme spinstall0.aspx, et surveiller les journaux IIS pour des requ\u00eates POST vers \/layouts\/15\/ToolPane.aspx. Les adresses IP suspectes incluent 107.191.58.76, 104.238.159.149 et 96.9.125.147.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-deployer-des-solutions-de-detection\">5. D\u00e9ployer des solutions de d\u00e9tection<\/h3>\n\n\n\n<p>L\u2019utilisation de Microsoft Defender <a href=\"https:\/\/ai-explorer.io\/blog\/securite-informatique-solutions-ia\/\" title=\"S\u00e9curit\u00e9 informatique : cinq mesures essentielles et le r\u00f4le de l\u2019IA en cybers\u00e9curit\u00e9\" target=\"_blank\" rel=\"noopener\" data-wpil-monitor-id=\"457\">for Endpoint ou d\u2019autres solutions<\/a> de d\u00e9tection avanc\u00e9es peut aider \u00e0 identifier et bloquer les activit\u00e9s post-exploitation.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-un-defi-pour-la-cybersecurite-moderne\">Un d\u00e9fi pour la cybers\u00e9curit\u00e9 moderne<\/h2>\n\n\n\n<p>Cette <strong>vuln\u00e9rabilit\u00e9 SharePoint<\/strong> met en lumi\u00e8re les limites des approches traditionnelles de s\u00e9curit\u00e9, notamment l\u2019hypoth\u00e8se que les utilisateurs authentifi\u00e9s sont fiables. Comme l\u2019a soulign\u00e9 Rik Ferguson de Forescout, les mod\u00e8les de confiance p\u00e9rim\u00e9trique sont obsol\u00e8tes face aux attaquants modernes.<\/p>\n\n\n\n<p>En outre, l\u2019exploitation rapide de cette faille, peu apr\u00e8s sa d\u00e9monstration \u00e0 Pwn2Own, montre l\u2019importance de la r\u00e9activit\u00e9 dans la gestion des vuln\u00e9rabilit\u00e9s zero-day. Les solutions bas\u00e9es sur l\u2019<strong>intelligence artificielle<\/strong>, capables d\u2019analyser les comportements anormaux en temps r\u00e9el, pourraient jouer un <a href=\"https:\/\/ai-explorer.io\/blog\/\" title=\"Le r\u00f4le de l\u2019apprentissage automatique dans l\u2019am\u00e9lioration de la s\u00e9curit\u00e9 des conteneurs natifs cloud\" target=\"_blank\" rel=\"noopener\" data-wpil-monitor-id=\"456\">r\u00f4le<\/a> cl\u00e9 dans la pr\u00e9vention de telles attaques \u00e0 l\u2019avenir.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<p>La <strong>vuln\u00e9rabilit\u00e9 SharePoint<\/strong> <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-53770\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-53770<\/a> repr\u00e9sente une menace critique pour les organisations utilisant des serveurs <strong>SharePoint<\/strong> sur site. Son exploitation massive, combin\u00e9e \u00e0 la capacit\u00e9 des attaquants \u00e0 contourner les correctifs initiaux, exige une r\u00e9ponse imm\u00e9diate et coordonn\u00e9e. En appliquant les correctifs, en renouvelant les cl\u00e9s cryptographiques et en renfor\u00e7ant la surveillance, les organisations peuvent limiter les dommages. Cependant, cet incident rappelle que la <strong>cybers\u00e9curit\u00e9<\/strong> n\u00e9cessite une vigilance constante et une adaptation rapide face aux menaces \u00e9mergentes.<\/p>\n\n\n\n<p>Sources :<br><a href=\"https:\/\/arstechnica.com\/security\/2025\/07\/sharepoint-vulnerability-with-9-8-severity-rating-is-under-exploit-across-the-globe\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/arstechnica.com\/security\/2025\/07\/sharepoint-vulnerability-with-9-8-severity-rating-is-under-exploit-across-the-globe\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Une vuln\u00e9rabilit\u00e9 SharePoint critique, identifi\u00e9e sous le code CVE-2025-53770, fait l\u2019objet d\u2019une exploitation massive \u00e0 l\u2019\u00e9chelle mondiale, mettant en danger les serveurs SharePoint sur site. Avec un score de gravit\u00e9 de 9,8 sur 10, cette faille permet \u00e0 des attaquants non authentifi\u00e9s d\u2019ex\u00e9cuter du code \u00e0 distance, compromettant des donn\u00e9es sensibles et des infrastructures critiques. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4996,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[379,381,241],"tags":[],"tmauthors":[],"class_list":{"0":"post-4994","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hack-fr","8":"category-securite-fr","9":"category-uncategorized-fr"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vuln\u00e9rabilit\u00e9 SharePoint critique exploit\u00e9e mondialement - AI Explorer<\/title>\n<meta name=\"description\" content=\"Une vuln\u00e9rabilit\u00e9 SharePoint critique fait l\u2019objet d\u2019une exploitation massive \u00e0 l\u2019\u00e9chelle mondiale.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vuln\u00e9rabilit\u00e9 SharePoint critique exploit\u00e9e mondialement - AI Explorer\" \/>\n<meta property=\"og:description\" content=\"Une vuln\u00e9rabilit\u00e9 SharePoint critique fait l\u2019objet d\u2019une exploitation massive \u00e0 l\u2019\u00e9chelle mondiale.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Explorer\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-22T08:59:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-18T03:31:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ai-explorer.io\/blog\/wp-content\/uploads\/2025\/07\/image-28.avif\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"La voix du futur\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@aiexplorernews\" \/>\n<meta name=\"twitter:site\" content=\"@aiexplorernews\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"La voix du futur\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/\"},\"author\":{\"name\":\"La voix du futur\",\"@id\":\"http:\/\/localhost:8081\/#\/schema\/person\/7af3a2824aaac8e3856fdeeaea3b0e1a\"},\"headline\":\"Vuln\u00e9rabilit\u00e9 SharePoint critique exploit\u00e9e mondialement\",\"datePublished\":\"2025-07-22T08:59:24+00:00\",\"dateModified\":\"2026-04-18T03:31:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/\"},\"wordCount\":935,\"commentCount\":1,\"publisher\":{\"@id\":\"http:\/\/localhost:8081\/#\/schema\/person\/7af3a2824aaac8e3856fdeeaea3b0e1a\"},\"image\":{\"@id\":\"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ai-explorer.io\/blog\/wp-content\/uploads\/2025\/07\/image-28.avif\",\"articleSection\":[\"Hack\",\"S\u00e9curit\u00e9\",\"Uncategorized\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/\",\"url\":\"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/\",\"name\":\"Vuln\u00e9rabilit\u00e9 SharePoint critique exploit\u00e9e mondialement - AI Explorer\",\"isPartOf\":{\"@id\":\"http:\/\/localhost:8081\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ai-explorer.io\/blog\/wp-content\/uploads\/2025\/07\/image-28.avif\",\"datePublished\":\"2025-07-22T08:59:24+00:00\",\"dateModified\":\"2026-04-18T03:31:24+00:00\",\"description\":\"Une vuln\u00e9rabilit\u00e9 SharePoint critique fait l\u2019objet d\u2019une exploitation massive \u00e0 l\u2019\u00e9chelle mondiale.\",\"breadcrumb\":{\"@id\":\"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/#primaryimage\",\"url\":\"https:\/\/ai-explorer.io\/blog\/wp-content\/uploads\/2025\/07\/image-28.avif\",\"contentUrl\":\"https:\/\/ai-explorer.io\/blog\/wp-content\/uploads\/2025\/07\/image-28.avif\",\"width\":768,\"height\":576,\"caption\":\"Vuln\u00e9rabilit\u00e9 SharePoint critique\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ai-explorer.io\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vuln\u00e9rabilit\u00e9 SharePoint critique exploit\u00e9e mondialement\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/localhost:8081\/#website\",\"url\":\"http:\/\/localhost:8081\/\",\"name\":\"AI Explorer - Actualit\u00e9s IA et tech en g\u00e9n\u00e9ral\",\"description\":\"Blog IA : actualit\u00e9s, guides et comparatifs\",\"publisher\":{\"@id\":\"http:\/\/localhost:8081\/#\/schema\/person\/7af3a2824aaac8e3856fdeeaea3b0e1a\"},\"alternateName\":\"AI Explorer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/localhost:8081\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"http:\/\/localhost:8081\/#\/schema\/person\/7af3a2824aaac8e3856fdeeaea3b0e1a\",\"name\":\"La voix du futur\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"http:\/\/localhost:8081\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/i0.wp.com\/ai-explorer.io\/wp-content\/uploads\/2025\/06\/image-2.jpg?fit=1024%2C1024&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/ai-explorer.io\/wp-content\/uploads\/2025\/06\/image-2.jpg?fit=1024%2C1024&ssl=1\",\"width\":1024,\"height\":1024,\"caption\":\"La voix du futur\"},\"logo\":{\"@id\":\"http:\/\/localhost:8081\/#\/schema\/person\/image\/\"},\"sameAs\":[\"https:\/\/ai-explorer.io\/blog\/\",\"https:\/\/x.com\/aiexplorernews\"],\"url\":\"https:\/\/ai-explorer.io\/blog\/author\/lavoixdufutur\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vuln\u00e9rabilit\u00e9 SharePoint critique exploit\u00e9e mondialement - AI Explorer","description":"Une vuln\u00e9rabilit\u00e9 SharePoint critique fait l\u2019objet d\u2019une exploitation massive \u00e0 l\u2019\u00e9chelle mondiale.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/","og_locale":"fr_FR","og_type":"article","og_title":"Vuln\u00e9rabilit\u00e9 SharePoint critique exploit\u00e9e mondialement - AI Explorer","og_description":"Une vuln\u00e9rabilit\u00e9 SharePoint critique fait l\u2019objet d\u2019une exploitation massive \u00e0 l\u2019\u00e9chelle mondiale.","og_url":"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/","og_site_name":"AI Explorer","article_published_time":"2025-07-22T08:59:24+00:00","article_modified_time":"2026-04-18T03:31:24+00:00","og_image":[{"width":768,"height":576,"url":"https:\/\/ai-explorer.io\/blog\/wp-content\/uploads\/2025\/07\/image-28.avif","type":"image\/jpeg"}],"author":"La voix du futur","twitter_card":"summary_large_image","twitter_creator":"@aiexplorernews","twitter_site":"@aiexplorernews","twitter_misc":{"\u00c9crit par":"La voix du futur","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/#article","isPartOf":{"@id":"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/"},"author":{"name":"La voix du futur","@id":"http:\/\/localhost:8081\/#\/schema\/person\/7af3a2824aaac8e3856fdeeaea3b0e1a"},"headline":"Vuln\u00e9rabilit\u00e9 SharePoint critique exploit\u00e9e mondialement","datePublished":"2025-07-22T08:59:24+00:00","dateModified":"2026-04-18T03:31:24+00:00","mainEntityOfPage":{"@id":"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/"},"wordCount":935,"commentCount":1,"publisher":{"@id":"http:\/\/localhost:8081\/#\/schema\/person\/7af3a2824aaac8e3856fdeeaea3b0e1a"},"image":{"@id":"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/#primaryimage"},"thumbnailUrl":"https:\/\/ai-explorer.io\/blog\/wp-content\/uploads\/2025\/07\/image-28.avif","articleSection":["Hack","S\u00e9curit\u00e9","Uncategorized"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/","url":"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/","name":"Vuln\u00e9rabilit\u00e9 SharePoint critique exploit\u00e9e mondialement - AI Explorer","isPartOf":{"@id":"http:\/\/localhost:8081\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/#primaryimage"},"image":{"@id":"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/#primaryimage"},"thumbnailUrl":"https:\/\/ai-explorer.io\/blog\/wp-content\/uploads\/2025\/07\/image-28.avif","datePublished":"2025-07-22T08:59:24+00:00","dateModified":"2026-04-18T03:31:24+00:00","description":"Une vuln\u00e9rabilit\u00e9 SharePoint critique fait l\u2019objet d\u2019une exploitation massive \u00e0 l\u2019\u00e9chelle mondiale.","breadcrumb":{"@id":"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/#primaryimage","url":"https:\/\/ai-explorer.io\/blog\/wp-content\/uploads\/2025\/07\/image-28.avif","contentUrl":"https:\/\/ai-explorer.io\/blog\/wp-content\/uploads\/2025\/07\/image-28.avif","width":768,"height":576,"caption":"Vuln\u00e9rabilit\u00e9 SharePoint critique"},{"@type":"BreadcrumbList","@id":"https:\/\/ai-explorer.io\/blog\/vulnerabilite-sharepoint-critique-exploitee-mondialement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ai-explorer.io\/blog\/"},{"@type":"ListItem","position":2,"name":"Vuln\u00e9rabilit\u00e9 SharePoint critique exploit\u00e9e mondialement"}]},{"@type":"WebSite","@id":"http:\/\/localhost:8081\/#website","url":"http:\/\/localhost:8081\/","name":"AI Explorer - Actualit\u00e9s IA et tech en g\u00e9n\u00e9ral","description":"Blog IA : actualit\u00e9s, guides et comparatifs","publisher":{"@id":"http:\/\/localhost:8081\/#\/schema\/person\/7af3a2824aaac8e3856fdeeaea3b0e1a"},"alternateName":"AI Explorer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/localhost:8081\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":["Person","Organization"],"@id":"http:\/\/localhost:8081\/#\/schema\/person\/7af3a2824aaac8e3856fdeeaea3b0e1a","name":"La voix du futur","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"http:\/\/localhost:8081\/#\/schema\/person\/image\/","url":"https:\/\/i0.wp.com\/ai-explorer.io\/wp-content\/uploads\/2025\/06\/image-2.jpg?fit=1024%2C1024&ssl=1","contentUrl":"https:\/\/i0.wp.com\/ai-explorer.io\/wp-content\/uploads\/2025\/06\/image-2.jpg?fit=1024%2C1024&ssl=1","width":1024,"height":1024,"caption":"La voix du futur"},"logo":{"@id":"http:\/\/localhost:8081\/#\/schema\/person\/image\/"},"sameAs":["https:\/\/ai-explorer.io\/blog\/","https:\/\/x.com\/aiexplorernews"],"url":"https:\/\/ai-explorer.io\/blog\/author\/lavoixdufutur\/"}]}},"_links":{"self":[{"href":"https:\/\/ai-explorer.io\/blog\/wp-json\/wp\/v2\/posts\/4994","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ai-explorer.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ai-explorer.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ai-explorer.io\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ai-explorer.io\/blog\/wp-json\/wp\/v2\/comments?post=4994"}],"version-history":[{"count":4,"href":"https:\/\/ai-explorer.io\/blog\/wp-json\/wp\/v2\/posts\/4994\/revisions"}],"predecessor-version":[{"id":5000,"href":"https:\/\/ai-explorer.io\/blog\/wp-json\/wp\/v2\/posts\/4994\/revisions\/5000"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ai-explorer.io\/blog\/wp-json\/wp\/v2\/media\/4996"}],"wp:attachment":[{"href":"https:\/\/ai-explorer.io\/blog\/wp-json\/wp\/v2\/media?parent=4994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ai-explorer.io\/blog\/wp-json\/wp\/v2\/categories?post=4994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ai-explorer.io\/blog\/wp-json\/wp\/v2\/tags?post=4994"},{"taxonomy":"tmauthors","embeddable":true,"href":"https:\/\/ai-explorer.io\/blog\/wp-json\/wp\/v2\/tmauthors?post=4994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}