CVE-2024-7262: CWE-22: Improper Limitation of a Pathname to a Restricted Directory in Kingsoft WPS Office
Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library. The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document
AI Analysis
Technical Summary
CVE-2024-7262 is a critical security vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) affecting Kingsoft WPS Office on Windows platforms, specifically versions from 12.2.0.13110 up to but excluding 12.2.0.16412. The flaw exists in the promecefpluginhost.exe process, which fails to properly validate file paths, enabling an attacker to perform a path traversal attack. This allows the attacker to load arbitrary Windows dynamic link libraries (DLLs) by manipulating the pathname input. The vulnerability is exploited via a maliciously crafted spreadsheet document that, when opened and interacted with by a user (single-click), triggers the loading of unauthorized libraries, potentially leading to remote code execution. The CVSS 4.0 vector indicates local attack vector (AV:L) but with low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:P). The impact on confidentiality, integrity, and availability is rated high, reflecting the potential for full system compromise. Although no public exploits have been reported yet, the vulnerability's characteristics and weaponization in deceptive documents suggest a high risk of exploitation. The lack of available patches at the time of reporting necessitates immediate risk mitigation strategies.
Potential Impact
For European organizations, the impact of CVE-2024-7262 is significant due to the widespread use of Kingsoft WPS Office as an alternative productivity suite, especially in enterprises and government agencies seeking cost-effective solutions. Successful exploitation can lead to arbitrary code execution with the privileges of the user opening the malicious document, potentially resulting in data theft, installation of persistent malware, lateral movement within networks, and disruption of business operations. Confidentiality is at risk as attackers may access sensitive documents and credentials. Integrity and availability can be compromised through system manipulation or denial of service. The requirement for user interaction via a deceptive spreadsheet increases the risk in environments where users frequently exchange documents or where phishing defenses are weak. Given the critical severity and ease of exploitation, organizations face a high risk of targeted attacks or opportunistic exploitation campaigns.
Mitigation Recommendations
1. Immediately audit and inventory all installations of Kingsoft WPS Office to identify affected versions (12.2.0.13110 up to 12.2.0.16412 exclusive). 2. Apply vendor patches or updates as soon as they become available; monitor Kingsoft’s official channels for patch releases. 3. Until patches are available, restrict execution privileges of promecefpluginhost.exe using application control policies to limit DLL loading from untrusted directories. 4. Employ endpoint detection and response (EDR) solutions to monitor for anomalous DLL loads or process behaviors related to WPS Office. 5. Implement strict email and document filtering to block or quarantine suspicious spreadsheet attachments, especially from unknown or untrusted sources. 6. Conduct user awareness training focused on the risks of opening unsolicited or unexpected documents and recognizing phishing attempts. 7. Use sandboxing or isolated environments for opening documents from external sources to contain potential exploitation. 8. Consider network segmentation to limit lateral movement if a compromise occurs. 9. Regularly review and update incident response plans to include scenarios involving exploitation of office suite vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2024-7262: CWE-22: Improper Limitation of a Pathname to a Restricted Directory in Kingsoft WPS Office
Description
Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library. The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document
AI-Powered Analysis
Technical Analysis
CVE-2024-7262 is a critical security vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) affecting Kingsoft WPS Office on Windows platforms, specifically versions from 12.2.0.13110 up to but excluding 12.2.0.16412. The flaw exists in the promecefpluginhost.exe process, which fails to properly validate file paths, enabling an attacker to perform a path traversal attack. This allows the attacker to load arbitrary Windows dynamic link libraries (DLLs) by manipulating the pathname input. The vulnerability is exploited via a maliciously crafted spreadsheet document that, when opened and interacted with by a user (single-click), triggers the loading of unauthorized libraries, potentially leading to remote code execution. The CVSS 4.0 vector indicates local attack vector (AV:L) but with low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:P). The impact on confidentiality, integrity, and availability is rated high, reflecting the potential for full system compromise. Although no public exploits have been reported yet, the vulnerability's characteristics and weaponization in deceptive documents suggest a high risk of exploitation. The lack of available patches at the time of reporting necessitates immediate risk mitigation strategies.
Potential Impact
For European organizations, the impact of CVE-2024-7262 is significant due to the widespread use of Kingsoft WPS Office as an alternative productivity suite, especially in enterprises and government agencies seeking cost-effective solutions. Successful exploitation can lead to arbitrary code execution with the privileges of the user opening the malicious document, potentially resulting in data theft, installation of persistent malware, lateral movement within networks, and disruption of business operations. Confidentiality is at risk as attackers may access sensitive documents and credentials. Integrity and availability can be compromised through system manipulation or denial of service. The requirement for user interaction via a deceptive spreadsheet increases the risk in environments where users frequently exchange documents or where phishing defenses are weak. Given the critical severity and ease of exploitation, organizations face a high risk of targeted attacks or opportunistic exploitation campaigns.
Mitigation Recommendations
1. Immediately audit and inventory all installations of Kingsoft WPS Office to identify affected versions (12.2.0.13110 up to 12.2.0.16412 exclusive). 2. Apply vendor patches or updates as soon as they become available; monitor Kingsoft’s official channels for patch releases. 3. Until patches are available, restrict execution privileges of promecefpluginhost.exe using application control policies to limit DLL loading from untrusted directories. 4. Employ endpoint detection and response (EDR) solutions to monitor for anomalous DLL loads or process behaviors related to WPS Office. 5. Implement strict email and document filtering to block or quarantine suspicious spreadsheet attachments, especially from unknown or untrusted sources. 6. Conduct user awareness training focused on the risks of opening unsolicited or unexpected documents and recognizing phishing attempts. 7. Use sandboxing or isolated environments for opening documents from external sources to contain potential exploitation. 8. Consider network segmentation to limit lateral movement if a compromise occurs. 9. Regularly review and update incident response plans to include scenarios involving exploitation of office suite vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ESET
- Date Reserved
- 2024-07-30T07:50:53.765Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f7d9b7247d717aace26c85
Added to database: 10/21/2025, 7:06:31 PM
Last enriched: 10/21/2025, 7:14:00 PM
Last updated: 10/30/2025, 4:57:32 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-24893: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-platform
CriticalCVE-2024-2961: CWE-787 Out-of-bounds Write in The GNU C Library glibc
HighCVE-2025-12475: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in creativethemeshq Blocksy Companion
MediumCVE-2025-62257: CWE-307 Improper Restriction of Excessive Authentication Attempts in Liferay Portal
MediumCVE-2025-9954: CWE-862 Missing Authorization in Drupal Acquia DAM
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.