CVE-2025-14714: CWE-288 Authentication Bypass Using an Alternate Path or Channel in The Document Foundation LibreOffice
An Authentication Bypass vulnerability existed where the application bundled an interpreter (Python) that inherits the Transparency, Consent, and Control (TCC) permissions granted by the user to the main application bundle By executing the bundled interpreter directly the attacker's scripts run with the application's TCC privileges In fixed versions parent-constraints are used to allow only the main application to launch interpreter with those permissions This issue affects LibreOffice on macOS: from 25.2 before < 25.2.4.
AI Analysis
Technical Summary
CVE-2025-14714 is an authentication bypass vulnerability classified under CWE-288, affecting LibreOffice on macOS versions 25.2 prior to 25.2.4. The root cause stems from the way the application bundles a Python interpreter that inherits the Transparency, Consent, and Control (TCC) permissions granted to the main LibreOffice application bundle. TCC is a macOS security framework that controls access to sensitive user data and system resources. Because the interpreter inherits these permissions, an attacker with local access can execute malicious scripts directly via the bundled Python interpreter, effectively bypassing the intended authentication and permission checks imposed on the main application. This allows the attacker's code to run with the same TCC privileges as LibreOffice, potentially accessing protected resources without explicit user consent. The vulnerability does not require user interaction but does require low-level privileges on the host system. The fix implemented in version 25.2.4 introduces parent-constraints, ensuring that only the main LibreOffice application can launch the interpreter with elevated TCC permissions, thereby preventing direct unauthorized interpreter execution. The CVSS 4.0 vector indicates local attack vector, low attack complexity, privileges required, no user interaction, and no impact on confidentiality, integrity, or availability, resulting in a very low severity score of 0.9. No known exploits are reported in the wild as of publication. This vulnerability highlights the risk of bundled interpreters inheriting excessive permissions and the importance of strict process launch constraints in macOS applications.
Potential Impact
For European organizations, the impact of CVE-2025-14714 is limited but non-negligible. Since exploitation requires local access with low privileges and no user interaction, the threat primarily concerns insider threats or attackers who have already compromised a low-privilege user account on macOS systems running affected LibreOffice versions. The vulnerability could allow attackers to escalate privileges within the scope of TCC permissions granted to LibreOffice, potentially accessing sensitive user data such as contacts, calendar, location, or camera/microphone access if those permissions are granted. However, it does not directly compromise system-wide confidentiality, integrity, or availability. The risk is higher in environments where LibreOffice is widely used on macOS endpoints and where sensitive data is protected by TCC permissions. Organizations with strict data privacy requirements under GDPR should consider the potential for unauthorized data access as a compliance risk. The lack of known exploits reduces immediate urgency but patching is recommended to close this attack vector. Overall, the impact is low but could facilitate lateral movement or privilege escalation in targeted attacks.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Immediately update LibreOffice on all macOS endpoints to version 25.2.4 or later, which contains the fix implementing parent-constraints to restrict interpreter launches. 2) Audit macOS systems for the presence of vulnerable LibreOffice versions and remove or isolate outdated installations. 3) Restrict local user privileges to minimize the risk of low-privilege accounts executing unauthorized code. 4) Monitor execution of the bundled Python interpreter within LibreOffice directories to detect anomalous script execution attempts. 5) Employ endpoint detection and response (EDR) tools capable of identifying suspicious process launches related to LibreOffice and its interpreter. 6) Educate users about the risks of running untrusted scripts and the importance of applying software updates promptly. 7) Review TCC permission grants for LibreOffice and revoke any unnecessary or excessive permissions to reduce the attack surface. 8) Implement application whitelisting or macOS system integrity protections to prevent unauthorized interpreter execution outside the main application context. These targeted actions go beyond generic patching advice and address the specific exploitation vector of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2025-14714: CWE-288 Authentication Bypass Using an Alternate Path or Channel in The Document Foundation LibreOffice
Description
An Authentication Bypass vulnerability existed where the application bundled an interpreter (Python) that inherits the Transparency, Consent, and Control (TCC) permissions granted by the user to the main application bundle By executing the bundled interpreter directly the attacker's scripts run with the application's TCC privileges In fixed versions parent-constraints are used to allow only the main application to launch interpreter with those permissions This issue affects LibreOffice on macOS: from 25.2 before < 25.2.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-14714 is an authentication bypass vulnerability classified under CWE-288, affecting LibreOffice on macOS versions 25.2 prior to 25.2.4. The root cause stems from the way the application bundles a Python interpreter that inherits the Transparency, Consent, and Control (TCC) permissions granted to the main LibreOffice application bundle. TCC is a macOS security framework that controls access to sensitive user data and system resources. Because the interpreter inherits these permissions, an attacker with local access can execute malicious scripts directly via the bundled Python interpreter, effectively bypassing the intended authentication and permission checks imposed on the main application. This allows the attacker's code to run with the same TCC privileges as LibreOffice, potentially accessing protected resources without explicit user consent. The vulnerability does not require user interaction but does require low-level privileges on the host system. The fix implemented in version 25.2.4 introduces parent-constraints, ensuring that only the main LibreOffice application can launch the interpreter with elevated TCC permissions, thereby preventing direct unauthorized interpreter execution. The CVSS 4.0 vector indicates local attack vector, low attack complexity, privileges required, no user interaction, and no impact on confidentiality, integrity, or availability, resulting in a very low severity score of 0.9. No known exploits are reported in the wild as of publication. This vulnerability highlights the risk of bundled interpreters inheriting excessive permissions and the importance of strict process launch constraints in macOS applications.
Potential Impact
For European organizations, the impact of CVE-2025-14714 is limited but non-negligible. Since exploitation requires local access with low privileges and no user interaction, the threat primarily concerns insider threats or attackers who have already compromised a low-privilege user account on macOS systems running affected LibreOffice versions. The vulnerability could allow attackers to escalate privileges within the scope of TCC permissions granted to LibreOffice, potentially accessing sensitive user data such as contacts, calendar, location, or camera/microphone access if those permissions are granted. However, it does not directly compromise system-wide confidentiality, integrity, or availability. The risk is higher in environments where LibreOffice is widely used on macOS endpoints and where sensitive data is protected by TCC permissions. Organizations with strict data privacy requirements under GDPR should consider the potential for unauthorized data access as a compliance risk. The lack of known exploits reduces immediate urgency but patching is recommended to close this attack vector. Overall, the impact is low but could facilitate lateral movement or privilege escalation in targeted attacks.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Immediately update LibreOffice on all macOS endpoints to version 25.2.4 or later, which contains the fix implementing parent-constraints to restrict interpreter launches. 2) Audit macOS systems for the presence of vulnerable LibreOffice versions and remove or isolate outdated installations. 3) Restrict local user privileges to minimize the risk of low-privilege accounts executing unauthorized code. 4) Monitor execution of the bundled Python interpreter within LibreOffice directories to detect anomalous script execution attempts. 5) Employ endpoint detection and response (EDR) tools capable of identifying suspicious process launches related to LibreOffice and its interpreter. 6) Educate users about the risks of running untrusted scripts and the importance of applying software updates promptly. 7) Review TCC permission grants for LibreOffice and revoke any unnecessary or excessive permissions to reduce the attack surface. 8) Implement application whitelisting or macOS system integrity protections to prevent unauthorized interpreter execution outside the main application context. These targeted actions go beyond generic patching advice and address the specific exploitation vector of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Document Fdn.
- Date Reserved
- 2025-12-15T09:52:45.310Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693fea3cd9bcdf3f3dd304f7
Added to database: 12/15/2025, 11:00:12 AM
Last enriched: 12/15/2025, 11:15:34 AM
Last updated: 12/15/2025, 4:21:58 PM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-23184: CWE-400 Uncontrolled Resource Consumption in Apache Software Foundation Apache CXF
MediumCVE-2025-60786: n/a
UnknownCVE-2024-44599: n/a
UnknownCVE-2024-44598: n/a
UnknownCVE-2025-66963: n/a
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.