Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally.
2026-01-26T18:16:38.540
2026-02-11T15:40:33.473
Analyzed
CVSSv3.1: 7.8 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | microsoft | 365_apps | - | Yes |
| Application | microsoft | 365_apps | - | Yes |
| Application | microsoft | office | 2016 | Yes |
| Application | microsoft | office | 2016 | Yes |
| Application | microsoft | office | 2019 | Yes |
| Application | microsoft | office | 2019 | Yes |
| Application | microsoft | office_long_term_servicing_channel | 2021 | Yes |
| Application | microsoft | office_long_term_servicing_channel | 2021 | Yes |
| Application | microsoft | office_long_term_servicing_channel | 2024 | Yes |
| Application | microsoft | office_long_term_servicing_channel | 2024 | Yes |