CVE-2025-14714

An Authentication Bypass vulnerability existed where the application bundled an interpreter (Python) that inherits the Transparency, Consent, and Control (TCC) permissions granted by the user to the main application bundle By executing the bundled interpreter directly the attacker's scripts run with the application's TCC privileges In fixed versions parent-constraints are used to allow only the main application to launch interpreter with those permissions This issue affects LibreOffice on macOS: from 25.2 before < 25.2.4.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*

History

18 Feb 2026, 14:32

Type Values Removed Values Added
References () https://www.libreoffice.org/about-us/security/advisories/cve-2025-14714 - () https://www.libreoffice.org/about-us/security/advisories/cve-2025-14714 - Vendor Advisory
CPE cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
First Time Apple macos
Apple
Libreoffice libreoffice
Libreoffice
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

15 Dec 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-15 11:15

Updated : 2026-02-18 14:32


NVD link : CVE-2025-14714

Mitre link : CVE-2025-14714

CVE.ORG link : CVE-2025-14714


JSON object : View

Products Affected

libreoffice

  • libreoffice

apple

  • macos
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel