CVE-2025-26629

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*
cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*

History

01 Jul 2025, 19:47

Type Values Removed Values Added
CPE cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*
cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*
References () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26629 - () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26629 - Vendor Advisory
Summary
  • (es) El uso posterior a la liberación en Microsoft Office permite que un atacante no autorizado ejecute código localmente.
First Time Microsoft
Microsoft office Long Term Servicing Channel
Microsoft 365 Apps

11 Mar 2025, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-11 17:16

Updated : 2025-07-01 19:47


NVD link : CVE-2025-26629

Mitre link : CVE-2025-26629

CVE.ORG link : CVE-2025-26629


JSON object : View

Products Affected

microsoft

  • office_long_term_servicing_channel
  • 365_apps
CWE
CWE-416

Use After Free