CVE-2025-26629

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*
cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*

History

01 Jul 2025, 19:47

Type Values Removed Values Added
CPE cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*
cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*
cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*
First Time Microsoft
Microsoft 365 Apps
Microsoft office Long Term Servicing Channel
References () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26629 - () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26629 - Vendor Advisory

11 Mar 2025, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-11 17:16

Updated : 2025-07-01 19:47


NVD link : CVE-2025-26629

Mitre link : CVE-2025-26629


JSON object : View

Products Affected

microsoft

  • 365_apps
  • office_long_term_servicing_channel
CWE
CWE-416

Use After Free