Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14714: CWE-288 Authentication Bypass Using an Alternate Path or Channel in The Document Foundation LibreOffice

0
Low
VulnerabilityCVE-2025-14714cvecve-2025-14714cwe-288
Published: Mon Dec 15 2025 (12/15/2025, 10:30:55 UTC)
Source: CVE Database V5
Vendor/Project: The Document Foundation
Product: LibreOffice

Description

An Authentication Bypass vulnerability existed where the application bundled an interpreter (Python) that inherits the Transparency, Consent, and Control (TCC) permissions granted by the user to the main application bundle By executing the bundled interpreter directly the attacker's scripts run with the application's TCC privileges In fixed versions parent-constraints are used to allow only the main application to launch interpreter with those permissions This issue affects LibreOffice on macOS: from 25.2 before < 25.2.4.

AI-Powered Analysis

AILast updated: 12/15/2025, 11:15:34 UTC

Technical Analysis

CVE-2025-14714 is an authentication bypass vulnerability classified under CWE-288, affecting LibreOffice on macOS versions 25.2 prior to 25.2.4. The root cause stems from the way the application bundles a Python interpreter that inherits the Transparency, Consent, and Control (TCC) permissions granted to the main LibreOffice application bundle. TCC is a macOS security framework that controls access to sensitive user data and system resources. Because the interpreter inherits these permissions, an attacker with local access can execute malicious scripts directly via the bundled Python interpreter, effectively bypassing the intended authentication and permission checks imposed on the main application. This allows the attacker's code to run with the same TCC privileges as LibreOffice, potentially accessing protected resources without explicit user consent. The vulnerability does not require user interaction but does require low-level privileges on the host system. The fix implemented in version 25.2.4 introduces parent-constraints, ensuring that only the main LibreOffice application can launch the interpreter with elevated TCC permissions, thereby preventing direct unauthorized interpreter execution. The CVSS 4.0 vector indicates local attack vector, low attack complexity, privileges required, no user interaction, and no impact on confidentiality, integrity, or availability, resulting in a very low severity score of 0.9. No known exploits are reported in the wild as of publication. This vulnerability highlights the risk of bundled interpreters inheriting excessive permissions and the importance of strict process launch constraints in macOS applications.

Potential Impact

For European organizations, the impact of CVE-2025-14714 is limited but non-negligible. Since exploitation requires local access with low privileges and no user interaction, the threat primarily concerns insider threats or attackers who have already compromised a low-privilege user account on macOS systems running affected LibreOffice versions. The vulnerability could allow attackers to escalate privileges within the scope of TCC permissions granted to LibreOffice, potentially accessing sensitive user data such as contacts, calendar, location, or camera/microphone access if those permissions are granted. However, it does not directly compromise system-wide confidentiality, integrity, or availability. The risk is higher in environments where LibreOffice is widely used on macOS endpoints and where sensitive data is protected by TCC permissions. Organizations with strict data privacy requirements under GDPR should consider the potential for unauthorized data access as a compliance risk. The lack of known exploits reduces immediate urgency but patching is recommended to close this attack vector. Overall, the impact is low but could facilitate lateral movement or privilege escalation in targeted attacks.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Immediately update LibreOffice on all macOS endpoints to version 25.2.4 or later, which contains the fix implementing parent-constraints to restrict interpreter launches. 2) Audit macOS systems for the presence of vulnerable LibreOffice versions and remove or isolate outdated installations. 3) Restrict local user privileges to minimize the risk of low-privilege accounts executing unauthorized code. 4) Monitor execution of the bundled Python interpreter within LibreOffice directories to detect anomalous script execution attempts. 5) Employ endpoint detection and response (EDR) tools capable of identifying suspicious process launches related to LibreOffice and its interpreter. 6) Educate users about the risks of running untrusted scripts and the importance of applying software updates promptly. 7) Review TCC permission grants for LibreOffice and revoke any unnecessary or excessive permissions to reduce the attack surface. 8) Implement application whitelisting or macOS system integrity protections to prevent unauthorized interpreter execution outside the main application context. These targeted actions go beyond generic patching advice and address the specific exploitation vector of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Document Fdn.
Date Reserved
2025-12-15T09:52:45.310Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693fea3cd9bcdf3f3dd304f7

Added to database: 12/15/2025, 11:00:12 AM

Last enriched: 12/15/2025, 11:15:34 AM

Last updated: 12/15/2025, 4:21:58 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats