CVE-2023-0950: CWE-129 Improper Validation of Array Index in The Document Foundation LibreOffice
Improper Validation of Array Index vulnerability in the spreadsheet component of The Document Foundation LibreOffice allows an attacker to craft a spreadsheet document that will cause an array index underflow when loaded. In the affected versions of LibreOffice certain malformed spreadsheet formulas, such as AGGREGATE, could be created with less parameters passed to the formula interpreter than it expected, leading to an array index underflow, in which case there is a risk that arbitrary code could be executed. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.6; 7.5 versions prior to 7.5.1.
AI Analysis
Technical Summary
CVE-2023-0950 is a high-severity vulnerability identified in the spreadsheet component of The Document Foundation's LibreOffice software, specifically affecting versions 7.4 prior to 7.4.6 and 7.5 prior to 7.5.1. The root cause is an improper validation of array indices (CWE-129) within the formula interpreter, particularly when processing certain malformed spreadsheet formulas such as AGGREGATE. When an attacker crafts a spreadsheet document with fewer parameters than expected by the formula interpreter, this leads to an array index underflow condition. This underflow can cause the program to access memory locations outside the intended bounds, potentially allowing an attacker to execute arbitrary code on the victim's system. The vulnerability requires the victim to open or load a maliciously crafted spreadsheet document, implying user interaction is necessary. The CVSS 3.1 base score of 7.8 reflects a high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the potential for remote code execution through a widely used office suite component makes this vulnerability significant. LibreOffice is a popular open-source office productivity suite used globally, including extensively across European public administrations, educational institutions, and private enterprises, increasing the risk profile for European organizations if unpatched versions are in use.
Potential Impact
For European organizations, the impact of CVE-2023-0950 can be substantial. LibreOffice is widely adopted in Europe due to its open-source nature, cost-effectiveness, and compatibility with various document formats. The ability for an attacker to execute arbitrary code by tricking users into opening a malicious spreadsheet could lead to full system compromise, data theft, ransomware deployment, or lateral movement within networks. Public sector entities, educational institutions, and small to medium enterprises that rely on LibreOffice without strict patch management policies are particularly vulnerable. The confidentiality of sensitive data could be breached, integrity of critical documents compromised, and availability of systems disrupted. Given the low complexity of exploitation and no need for privileges, attackers could leverage phishing campaigns to deliver malicious documents. This vulnerability could also be exploited to target critical infrastructure or strategic organizations in Europe, amplifying geopolitical risks.
Mitigation Recommendations
European organizations should prioritize updating LibreOffice installations to versions 7.4.6 or later and 7.5.1 or later, where this vulnerability is patched. Beyond patching, organizations should implement strict document handling policies, including disabling automatic formula calculation or enabling protected view modes for documents from untrusted sources. Deploying endpoint security solutions capable of detecting anomalous behavior related to document processing can provide an additional layer of defense. User awareness training should emphasize the risks of opening unsolicited or unexpected spreadsheet files, especially those received via email. Network segmentation and application whitelisting can limit the impact of potential exploitation. For environments where immediate patching is not feasible, consider restricting LibreOffice usage or employing sandboxing techniques to isolate document processing. Monitoring for unusual process behavior or memory access patterns related to LibreOffice can help in early detection of exploitation attempts.
Affected Countries
Germany, France, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Finland, Austria
CVE-2023-0950: CWE-129 Improper Validation of Array Index in The Document Foundation LibreOffice
Description
Improper Validation of Array Index vulnerability in the spreadsheet component of The Document Foundation LibreOffice allows an attacker to craft a spreadsheet document that will cause an array index underflow when loaded. In the affected versions of LibreOffice certain malformed spreadsheet formulas, such as AGGREGATE, could be created with less parameters passed to the formula interpreter than it expected, leading to an array index underflow, in which case there is a risk that arbitrary code could be executed. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.6; 7.5 versions prior to 7.5.1.
AI-Powered Analysis
Technical Analysis
CVE-2023-0950 is a high-severity vulnerability identified in the spreadsheet component of The Document Foundation's LibreOffice software, specifically affecting versions 7.4 prior to 7.4.6 and 7.5 prior to 7.5.1. The root cause is an improper validation of array indices (CWE-129) within the formula interpreter, particularly when processing certain malformed spreadsheet formulas such as AGGREGATE. When an attacker crafts a spreadsheet document with fewer parameters than expected by the formula interpreter, this leads to an array index underflow condition. This underflow can cause the program to access memory locations outside the intended bounds, potentially allowing an attacker to execute arbitrary code on the victim's system. The vulnerability requires the victim to open or load a maliciously crafted spreadsheet document, implying user interaction is necessary. The CVSS 3.1 base score of 7.8 reflects a high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the potential for remote code execution through a widely used office suite component makes this vulnerability significant. LibreOffice is a popular open-source office productivity suite used globally, including extensively across European public administrations, educational institutions, and private enterprises, increasing the risk profile for European organizations if unpatched versions are in use.
Potential Impact
For European organizations, the impact of CVE-2023-0950 can be substantial. LibreOffice is widely adopted in Europe due to its open-source nature, cost-effectiveness, and compatibility with various document formats. The ability for an attacker to execute arbitrary code by tricking users into opening a malicious spreadsheet could lead to full system compromise, data theft, ransomware deployment, or lateral movement within networks. Public sector entities, educational institutions, and small to medium enterprises that rely on LibreOffice without strict patch management policies are particularly vulnerable. The confidentiality of sensitive data could be breached, integrity of critical documents compromised, and availability of systems disrupted. Given the low complexity of exploitation and no need for privileges, attackers could leverage phishing campaigns to deliver malicious documents. This vulnerability could also be exploited to target critical infrastructure or strategic organizations in Europe, amplifying geopolitical risks.
Mitigation Recommendations
European organizations should prioritize updating LibreOffice installations to versions 7.4.6 or later and 7.5.1 or later, where this vulnerability is patched. Beyond patching, organizations should implement strict document handling policies, including disabling automatic formula calculation or enabling protected view modes for documents from untrusted sources. Deploying endpoint security solutions capable of detecting anomalous behavior related to document processing can provide an additional layer of defense. User awareness training should emphasize the risks of opening unsolicited or unexpected spreadsheet files, especially those received via email. Network segmentation and application whitelisting can limit the impact of potential exploitation. For environments where immediate patching is not feasible, consider restricting LibreOffice usage or employing sandboxing techniques to isolate document processing. Monitoring for unusual process behavior or memory access patterns related to LibreOffice can help in early detection of exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Document Fdn.
- Date Reserved
- 2023-02-22T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf4f3e
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/21/2025, 10:41:59 PM
Last updated: 7/26/2025, 4:49:04 PM
Views: 11
Related Threats
CVE-2025-8081: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in elemntor Elementor Website Builder – More Than Just a Page Builder
MediumCVE-2025-6253: CWE-862 Missing Authorization in uicore UiCore Elements – Free Elementor widgets and templates
HighCVE-2025-3892: CWE-250: Execution with Unnecessary Privileges in Axis Communications AB AXIS OS
MediumCVE-2025-30027: CWE-1287: Improper Validation of Specified Type of Input in Axis Communications AB AXIS OS
MediumCVE-2025-7622: CWE-918: Server-Side Request Forgery (SSRF) in Axis Communications AB AXIS Camera Station Pro
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.