First published: Tue Apr 08 2025(Updated: )
<p>Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.</p>
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office Long Term Servicing Channel for Mac | ||
Microsoft Office LTSC 2024 | ||
Microsoft 365 Apps for enterprise | ||
Microsoft SharePoint Server 2019 | ||
Microsoft Office 2019 for Mac | ||
Microsoft SharePoint Enterprise Server | ||
Microsoft Office 2019 for Mac | ||
Microsoft Word 2016 | ||
Microsoft Office LTSC 2021 | ||
Microsoft Word 2016 | ||
Microsoft 365 Apps for enterprise | ||
Microsoft Office LTSC 2021 | ||
Microsoft Office LTSC 2024 | ||
Microsoft Office Long Term Servicing Channel for Mac |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-27747 is classified as a critical severity vulnerability due to its potential for remote code execution.
To fix CVE-2025-27747, users should apply the latest security updates provided by Microsoft for the affected Office products.
CVE-2025-27747 affects various Microsoft Office products including Office LTSC for Mac 2021, Office LTSC 2024, and SharePoint Server 2019.
Yes, CVE-2025-27747 can potentially lead to unauthorized access and data theft if exploited by an attacker.
You can determine if your software is vulnerable to CVE-2025-27747 by checking the version of your Microsoft Office products against the list of affected software.