First published: Tue Apr 08 2025(Updated: )
<p>Improper input validation in Microsoft Office Word allows an unauthorized attacker to bypass a security feature over a network.</p>
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft 365 Apps for enterprise | ||
Microsoft Office Long Term Servicing Channel for Mac | ||
Microsoft Office Professional Plus 2016 | ||
Microsoft Office LTSC 2021 | ||
Microsoft Office LTSC 2021 | ||
Microsoft Office LTSC 2024 | ||
Microsoft Office Professional Plus 2016 | ||
Microsoft Office Long Term Servicing Channel for Mac | ||
Microsoft Word 2016 | ||
Microsoft Word 2016 | ||
Microsoft Office 2019 for Mac | ||
Microsoft Office LTSC 2024 | ||
Microsoft Office 2019 for Mac | ||
Microsoft 365 Apps for enterprise | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-29816 is classified as a high severity vulnerability due to its potential to allow unauthorized access to bypass security features.
To fix CVE-2025-29816, ensure that you apply the latest security updates provided by Microsoft for the affected Office products.
CVE-2025-29816 affects various Microsoft products including Microsoft 365 Apps for Enterprise, Office 2016, Office LTSC 2021, and Word 2016.
CVE-2025-29816 can enable attackers to bypass security features in Microsoft Office Word, potentially compromising sensitive data.
Currently, no specific workaround is documented for CVE-2025-29816; applying the patch is the recommended approach.