An Authentication Bypass vulnerability existed where the application bundled an interpreter (Python) that inherits the Transparency, Consent, and Control (TCC) permissions granted by the user to the main application bundle
By executing the bundled interpreter directly the attacker's scripts run with the application's TCC privileges
In fixed versions parent-constraints are used to allow only the main application to launch interpreter with those permissions
This issue affects LibreOffice on macOS: from 25.2 before < 25.2.4.
References
| Link | Resource |
|---|---|
| https://www.libreoffice.org/about-us/security/advisories/cve-2025-14714 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
18 Feb 2026, 14:32
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.libreoffice.org/about-us/security/advisories/cve-2025-14714 - Vendor Advisory | |
| CPE | cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* |
|
| First Time |
Apple macos
Apple Libreoffice libreoffice Libreoffice |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
15 Dec 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-15 11:15
Updated : 2026-02-18 14:32
NVD link : CVE-2025-14714
Mitre link : CVE-2025-14714
CVE.ORG link : CVE-2025-14714
JSON object : View
Products Affected
libreoffice
- libreoffice
apple
- macos
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel
