CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
Analysis
Use-after-free vulnerability in Microsoft Office Word that allows local, unauthenticated attackers to execute arbitrary code with high impact (confidentiality, integrity, availability). The vulnerability requires user interaction (e.g., opening a malicious document) but has low attack complexity, making it a significant local code execution threat. Without confirmed KEV status or EPSS data provided, the CVSS 7.8 score indicates high severity, though real-world exploitability depends on whether public exploits or proofs-of-concept have emerged.
Technical Context
This vulnerability is rooted in CWE-416 (Use After Free), a memory safety defect where Microsoft Word's document processing engine references memory that has been freed or deallocated. The defect likely occurs in Word's XML/document object model parsing or rendering subsystem when handling specially crafted Office Open XML (.docx) files. The use-after-free condition could corrupt the heap, overwrite function pointers, or leak sensitive memory, enabling code execution through classic heap exploitation techniques. Affected CPE would be Microsoft Office Word across multiple versions (likely Microsoft Word 2016, 2019, Office 365 perpetual/subscription variants), though specific version ranges are not provided in the source data.
Affected Products
- vendor: Microsoft; product: Office Word; versions: 2016, 2019, Office 365 (all versions until patched); cpe_family: cpe:2.3:a:microsoft:word; notes: Specific version ranges not provided; assume latest versions and recent legacy versions affected
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17729