KB5058379: Windows Server 2025, Windows Server 2022 +4 more Security Update (May 2025)
A memory-corruption flaw in the Microsoft Scripting Engine (JScript / Chakra-family interpreter still shipped for back-compat) allows remote code execution when a victim renders attacker-controlled script content. Exploited in the wild before the May 13 2025 disclosure.
An attacker who can get a target to render attacker-controlled script content — for example, via a malicious Office document, an Internet Explorer-mode rendering path in legacy enterprise apps, or an HTML-rendering component embedded in a third-party application — can execute code on the target as the rendering user. Combined with a local EoP (such as the CLFS or DWM zero-days in the same Patch Tuesday) the result is full system takeover from a single click.
CVE-2025-30397 is a memory-corruption vulnerability in the legacy Microsoft Scripting Engine, the JScript / Chakra-family component that Windows still ships for compatibility with applications and Office documents that embed scripted content. A crafted script triggers an unsafe memory state that allows arbitrary code execution in the context of the rendering process.
📧
Phishing link
🖼
Malicious file
🔓
Server compromised
Probably yes if any of these apply:
Affected OS versions
Microsoft flagged CVE-2025-30397 as Exploitation Detected in the May 13 2025 release. Scripting-engine RCEs are a recurring pattern in nation-state operator toolkits because they convert document-handling actions into reliable initial-access primitives.
Manual download
For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.
↗ Microsoft Update CatalogKB5058379Manual remediation steps
⏱ 30–60 minutes including rebootApply the Microsoft Security Update
Microsoft has released an official security update that fixes this vulnerability.
Required KB Updates
Supersedes: KB5055518, KB5055519, KB5055521, KB5055523, KB5055526, KB5055527, KB5055528, KB5055547, KB5055557, KB5055561, KB5055581, KB5055609
Affected Products
Fixed Build Numbers
Installation Methods
Windows Update (recommended)
Microsoft Update Catalog (manual download)
.msu installer with administrator privilegesWSUS / SCCM / Intune
Approve KB5058379 for the affected products in your update management console.
Microsoft Download Center Links
Verification
Confirm the update is installed:
Get-HotFix | Where-Object { $_.HotFixID -in @('KB5058379','KB5058380','KB5058383','KB5058384','KB5058385','KB5058387','KB5058392','KB5058403','KB5058405','KB5058411','KB5058429','KB5058430','KB5058449','KB5058451','KB5058454','KB5058497','KB5058500') }
References
Discovery Credit
Microsoft Threat Intelligence Center
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.