First published: Tue Feb 11 2025(Updated: )
Microsoft Excel Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office Online Server | ||
Microsoft Office Long Term Servicing Channel for Mac | ||
Microsoft Office Long Term Servicing Channel for Mac | ||
Microsoft Office 2019 for Mac | ||
Microsoft Office LTSC 2021 | ||
Microsoft Office 2019 for Mac | ||
Microsoft Office LTSC 2024 | ||
Microsoft Office LTSC 2021 | ||
Microsoft Office LTSC 2024 | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft 365 Apps for enterprise | ||
Microsoft 365 Apps for enterprise | ||
Microsoft Office Excel | =2016 | |
Microsoft Office Excel | =2016 | |
Microsoft Office | =2019 | |
Microsoft Office | =2019 | |
Microsoft Office | =2021 | |
Microsoft Office | =2021 | |
Microsoft Office | =2021 | |
Microsoft Office | =2024 | |
Microsoft Office | =2024 | |
Microsoft Office | =2024 | |
Microsoft Office Online Server | <16.0.10416.20058 | |
Microsoft Excel | ||
Microsoft Excel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2025-21381 is classified as a critical remote code execution vulnerability in Microsoft Excel.
To mitigate CVE-2025-21381, users should apply the patches provided by Microsoft for the affected Office products.
CVE-2025-21381 affects multiple versions of Microsoft Office, including Office 2019, Office LTSC, Excel 2016, and Office Online Server.
Yes, if exploited, CVE-2025-21381 could allow an attacker to execute arbitrary code, potentially resulting in data loss.
Yes, updating Office applications is crucial to protect against the vulnerabilities introduced by CVE-2025-21381.