Microsoft Scripting Engine flaw exploited in wild, Proof-of-Concept published
Take action: If you needed one more argument to patch your Windows, how about that hackers are persistent enough to target even the legacy Internet Explorer 11 mode in unpatched systems? Don't wait, patching Windows is not that hard.
Learn More
Microsoft is warning that a memory corruption vulnerability in its Scripting Engine that was fixed in the May 2025 Patch release is now actively exploited.
The flaw is tracked as CVE-2025-30397 (CVSS score 7.5) is a type confusion error in the Microsoft Scripting Engine, affecting the legacy JScript engine (jscript.dll). This flaw allows attackers to execute arbitrary code remotely when users click specially crafted URLs while using Microsoft Edge in Internet Explorer Mode.
The attack requires users to interact with malicious URLs while Microsoft Edge is configured in Internet Explorer Mode. Despite the high attack complexity required and Internet Explorer 11 being retired, apparently there are still organizations and users that can and have been targeted.
A GitHub user has released a proof-of-concept. The PoC does not constitute a ready-to-run exploit, it provides sufficient technical details that skilled attackers or automated tools could use to develop working exploits.
Users should patch their Windows computers ASAP. As a temporary mitigation measure, users can disable Internet Explorer Mode in Microsoft Edge where possible to reduce attack surface exposure.