Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1080: CWE-20 Improper Input Validation in The Document Foundation LibreOffice

0
High
VulnerabilityCVE-2025-1080cvecve-2025-1080cwe-20
Published: Tue Mar 04 2025 (03/04/2025, 20:04:10 UTC)
Source: CVE Database V5
Vendor/Project: The Document Foundation
Product: LibreOffice

Description

LibreOffice supports Office URI Schemes to enable browser integration of LibreOffice with MS SharePoint server. An additional scheme 'vnd.libreoffice.command' specific to LibreOffice was added. In the affected versions of LibreOffice a link in a browser using that scheme could be constructed with an embedded inner URL that when passed to LibreOffice could call internal macros with arbitrary arguments. This issue affects LibreOffice: from 24.8 before < 24.8.5, from 25.2 before < 25.2.1.

AI-Powered Analysis

AILast updated: 11/03/2025, 20:09:28 UTC

Technical Analysis

CVE-2025-1080 is a vulnerability classified under CWE-20 (Improper Input Validation) affecting LibreOffice versions 24.8 prior to 24.8.5 and 25.2 prior to 25.2.1. LibreOffice supports Office URI schemes to enable integration with Microsoft SharePoint servers via browsers. A LibreOffice-specific URI scheme, 'vnd.libreoffice.command', was introduced to facilitate this integration. The vulnerability arises because the input passed through this URI scheme is not properly validated, allowing an attacker to embed an inner URL that can invoke LibreOffice internal macros with arbitrary arguments. This means that if a user clicks on a specially crafted link in a browser, LibreOffice could be tricked into executing macros that may perform unauthorized actions such as data manipulation, execution of malicious code, or other harmful operations. The attack vector is local, requiring the user to interact by clicking the malicious link, and the attack complexity is high, indicating that exploitation requires precise conditions. No privileges or authentication are required, but user interaction is necessary. The vulnerability affects confidentiality, integrity, and availability due to the potential for arbitrary macro execution. Although no known exploits are currently reported in the wild, the presence of this vulnerability in widely used LibreOffice versions integrated with SharePoint environments presents a significant risk. The CVSS 4.0 score of 7.2 reflects these factors, emphasizing the importance of mitigation.

Potential Impact

For European organizations, this vulnerability poses a considerable risk, especially for enterprises and public sector entities that rely on LibreOffice integrated with Microsoft SharePoint for document management and collaboration. Successful exploitation could lead to unauthorized macro execution, potentially resulting in data leakage, corruption, or disruption of document workflows. This could compromise sensitive information, damage organizational reputation, and interrupt business operations. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to exploit this vulnerability. Given the widespread use of LibreOffice in European public administrations, educational institutions, and businesses, the impact could be broad. Additionally, organizations with strict regulatory compliance requirements (e.g., GDPR) may face legal and financial consequences if data confidentiality or integrity is compromised. The high attack complexity somewhat limits mass exploitation but targeted attacks against high-value targets remain a concern.

Mitigation Recommendations

1. Update LibreOffice to versions 24.8.5 or later and 25.2.1 or later as soon as patches become available. 2. Until patches are applied, disable or restrict the use of the 'vnd.libreoffice.command' URI scheme in browser and system settings to prevent automatic invocation. 3. Implement strict macro security policies within LibreOffice, such as disabling macros by default and allowing only digitally signed macros from trusted sources. 4. Educate users about the risks of clicking on unsolicited or suspicious links, especially those that may invoke document editing applications. 5. Employ endpoint protection solutions capable of detecting and blocking suspicious macro execution or unusual LibreOffice behaviors. 6. Monitor network and system logs for unusual activity related to LibreOffice or SharePoint integration. 7. Consider isolating document editing environments or using sandboxing techniques to limit potential damage from macro execution. 8. Coordinate with IT and security teams to review and harden integration points between LibreOffice and SharePoint.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Document Fdn.
Date Reserved
2025-02-06T13:14:08.175Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690908577fff0e30cee23a30

Added to database: 11/3/2025, 7:53:59 PM

Last enriched: 11/3/2025, 8:09:28 PM

Last updated: 11/4/2025, 2:32:35 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats