First published: Tue May 13 2025(Updated: )
<p>Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.</p>
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office 2019 for Mac | ||
Microsoft Office Long Term Servicing Channel for Mac | ||
Microsoft Office LTSC 2024 | ||
Microsoft Office Long Term Servicing Channel for Mac | ||
Microsoft Office Professional Plus 2016 | ||
Microsoft Office LTSC 2021 | ||
Microsoft Office LTSC 2021 | ||
Microsoft Office LTSC 2024 | ||
Microsoft Office 2019 for Mac | ||
Microsoft Office Professional Plus 2016 | ||
Microsoft 365 Apps for enterprise | ||
Microsoft 365 Apps for enterprise | ||
Microsoft 365 for Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-30386 has a high severity rating due to the potential for remote code execution.
To remediate CVE-2025-30386, ensure your Microsoft Office applications are updated to the latest security patches provided by Microsoft.
CVE-2025-30386 affects multiple versions of Microsoft Office, including Office 2016, Office 2019, Office LTSC 2021, and Office LTSC 2024.
CVE-2025-30386 is categorized as a use after free vulnerability, potentially allowing unauthorized local code execution.
Yes, if exploited, CVE-2025-30386 could allow attackers to execute arbitrary code and potentially lead to data breaches.