IRONSMITHINTEL
HIGHCVSS7.5
|
Actively Exploited
|CISA KEV|CVE-2025-30397|Auth: none for the script payload — user interaction required to load it|Reboot: required|Est. 30–60 minutes including reboot|Manual only

KB5058379: Windows Server 2025, Windows Server 2022 +4 more Security Update (May 2025)

A memory-corruption flaw in the Microsoft Scripting Engine (JScript / Chakra-family interpreter still shipped for back-compat) allows remote code execution when a victim renders attacker-controlled script content. Exploited in the wild before the May 13 2025 disclosure.

Published May 13, 2025 · Updated May 16, 2026
Why patchRisk explained in plain English
Worst-case scenarioIf unpatched

An attacker who can get a target to render attacker-controlled script content — for example, via a malicious Office document, an Internet Explorer-mode rendering path in legacy enterprise apps, or an HTML-rendering component embedded in a third-party application — can execute code on the target as the rendering user. Combined with a local EoP (such as the CLFS or DWM zero-days in the same Patch Tuesday) the result is full system takeover from a single click.

How the attack worksNo clicks needed

CVE-2025-30397 is a memory-corruption vulnerability in the legacy Microsoft Scripting Engine, the JScript / Chakra-family component that Windows still ships for compatibility with applications and Office documents that embed scripted content. A crafted script triggers an unsafe memory state that allows arbitrary code execution in the context of the rendering process.

📧

Phishing link

🖼

Malicious file

🔓

Server compromised

Am I affected?Quick check

Probably yes if any of these apply:

All Windows Server hosts that render documents or web content
Endpoints in environments that still use IE-mode rendering for legacy line-of-business applications
Users who open Office documents from untrusted sources
Running All supported Windows versions prior to the May 13 2025 cumulative update

Affected OS versions

Windows Server 2025Windows Server 2022Windows Server 2019Windows Server 2016Windows 11Windows 10
Fixed inKB5058379, KB5058380, KB5058383, KB5058384, KB5058385, KB5058387, KB5058392, KB5058403, KB5058405, KB5058411, KB5058429, KB5058430, KB5058449, KB5058451, KB5058454, KB5058497, KB5058500 (applies to 37 product versions) — build 1.003, 10.0.10240.21014+
Real-world incidentsWhat we've seen

Microsoft flagged CVE-2025-30397 as Exploitation Detected in the May 13 2025 release. Scripting-engine RCEs are a recurring pattern in nation-state operator toolkits because they convert document-handling actions into reliable initial-access primitives.

How to patch

Manual download

For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.

↗ Microsoft Update CatalogKB5058379

Manual remediation steps

30–60 minutes including reboot

Apply the Microsoft Security Update

Microsoft has released an official security update that fixes this vulnerability.

Required KB Updates

    1
    KB5058379 — https://support.microsoft.com/help/5058379
    1
    KB5058380 — https://support.microsoft.com/help/5058380
    1
    KB5058383 — https://support.microsoft.com/help/5058383
    1
    KB5058384 — https://support.microsoft.com/help/5058384
    1
    KB5058385 — https://support.microsoft.com/help/5058385
    1
    KB5058387 — https://support.microsoft.com/help/5058387
    1
    KB5058392 — https://support.microsoft.com/help/5058392
    1
    KB5058403 — https://support.microsoft.com/help/5058403
    1
    KB5058405 — https://support.microsoft.com/help/5058405
    1
    KB5058411 — https://support.microsoft.com/help/5058411
    1
    KB5058429 — https://support.microsoft.com/help/5058429
    1
    KB5058430 — https://support.microsoft.com/help/5058430
    1
    KB5058449 — https://support.microsoft.com/help/5058449
    1
    KB5058451 — https://support.microsoft.com/help/5058451
    1
    KB5058454 — https://support.microsoft.com/help/5058454
    1
    KB5058497 — https://support.microsoft.com/help/5058497
    1
    KB5058500 — https://support.microsoft.com/help/5058500

Supersedes: KB5055518, KB5055519, KB5055521, KB5055523, KB5055526, KB5055527, KB5055528, KB5055547, KB5055557, KB5055561, KB5055581, KB5055609

Affected Products

    1
    Windows 10 Version 1607 for 32-bit Systems
    1
    Windows 10 Version 1607 for x64-based Systems
    1
    Windows 10 Version 1809 for 32-bit Systems
    1
    Windows 10 Version 1809 for x64-based Systems
    1
    Windows 10 Version 21H2 for 32-bit Systems
    1
    Windows 10 Version 21H2 for ARM64-based Systems
    1
    Windows 10 Version 21H2 for x64-based Systems
    1
    Windows 10 Version 22H2 for 32-bit Systems
    1
    Windows 10 Version 22H2 for ARM64-based Systems
    1
    Windows 10 Version 22H2 for x64-based Systems
    1
    Windows 10 for 32-bit Systems
    1
    Windows 10 for x64-based Systems
    1
    Windows 11 Version 22H2 for ARM64-based Systems
    1
    Windows 11 Version 22H2 for x64-based Systems
    1
    Windows 11 Version 23H2 for ARM64-based Systems
    1
    Windows 11 Version 23H2 for x64-based Systems
    1
    Windows 11 Version 24H2 for ARM64-based Systems
    1
    Windows 11 Version 24H2 for x64-based Systems
    1
    Windows Server 2008 R2 for x64-based Systems Service Pack 1
    1
    Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
    1
    (…17 more product versions)

Fixed Build Numbers

    1
    1.003
    1
    10.0.10240.21014
    1
    10.0.14393.8066
    1
    10.0.17763.7314
    1
    10.0.19044.5854
    1
    10.0.19045.5854
    1
    10.0.20348.3630
    1
    10.0.20348.3692
    1
    10.0.22621.5335
    1
    10.0.22631.5335
    1
    (…7 more builds)

Installation Methods

Windows Update (recommended)

1
Settings → Windows Update → Check for updates
2
The security update is offered if your system is in scope
3
Restart when prompted — a reboot IS required to complete the install

Microsoft Update Catalog (manual download)

1
Open https://catalog.update.microsoft.com
2
Search for KB5058379
3
Download the package matching your OS architecture and Windows build
4
Run the .msu installer with administrator privileges
5
Restart when prompted

WSUS / SCCM / Intune

Approve KB5058379 for the affected products in your update management console.

Microsoft Download Center Links

    1
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379
    1
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058380
    1
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383
    1
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384
    1
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385
    1
    (…12 more)

Verification

Confirm the update is installed:

Get-HotFix | Where-Object { $_.HotFixID -in @('KB5058379','KB5058380','KB5058383','KB5058384','KB5058385','KB5058387','KB5058392','KB5058403','KB5058405','KB5058411','KB5058429','KB5058430','KB5058449','KB5058451','KB5058454','KB5058497','KB5058500') }

References

    1
    Microsoft Security Response Center: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30397
    1
    KB article: https://support.microsoft.com/help/5058379
    1
    KB article: https://support.microsoft.com/help/5058383
    1
    KB article: https://support.microsoft.com/help/5058384
    1
    NVD entry: https://nvd.nist.gov/vuln/detail/CVE-2025-30397
    1
    CISA KEV: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-30397

Discovery Credit

Microsoft Threat Intelligence Center

PowerShell automationComing soon

No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.