Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29822: CWE-184: Incomplete List of Disallowed Inputs in Microsoft Microsoft 365 Apps for Enterprise

0
High
VulnerabilityCVE-2025-29822cvecve-2025-29822cwe-184
Published: Tue Apr 08 2025 (04/08/2025, 17:23:32 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft 365 Apps for Enterprise

Description

Incomplete list of disallowed inputs in Microsoft Office OneNote allows an unauthorized attacker to bypass a security feature locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:31:08 UTC

Technical Analysis

CVE-2025-29822 is a vulnerability categorized under CWE-184 (Incomplete List of Disallowed Inputs) affecting Microsoft Office OneNote within Microsoft 365 Apps for Enterprise version 16.0.1. The flaw arises because the software does not comprehensively block certain malicious inputs, enabling an attacker with local access to bypass security controls designed to prevent unauthorized actions. This bypass can lead to unauthorized code execution or manipulation of data, compromising confidentiality, integrity, and availability. The vulnerability requires the attacker to have local access and to interact with the application (user interaction), but does not require any privileges or authentication, which lowers the barrier to exploitation. The CVSS 3.1 score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) indicates that while the attack vector is local, the impact is severe across all security dimensions. No public exploits are known yet, but the vulnerability is officially published and recognized by CISA, emphasizing the need for attention. The lack of patch links suggests that a fix may be pending or in development. Given the ubiquity of Microsoft 365 in enterprise environments, this vulnerability poses a significant risk, especially in environments where local user access is less controlled or where OneNote is used to handle sensitive or critical information.

Potential Impact

For European organizations, the impact of CVE-2025-29822 can be substantial. Microsoft 365 Apps for Enterprise is widely deployed across Europe, including in government, finance, healthcare, and critical infrastructure sectors. A successful local exploit could allow attackers to bypass security features, potentially leading to unauthorized data access, data corruption, or disruption of business operations. This is particularly concerning for organizations with stringent data protection requirements under GDPR, as breaches could result in regulatory penalties and reputational damage. The need for local access limits remote exploitation but insider threats or compromised endpoints could be leveraged to exploit this vulnerability. The high impact on confidentiality, integrity, and availability means that sensitive intellectual property, personal data, and operational continuity could be at risk. Additionally, the reliance on OneNote for collaboration and note-taking in many enterprises increases the attack surface. Without timely patching, organizations remain vulnerable to potential future exploits that could be weaponized by advanced threat actors targeting European entities.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply patches promptly once released for Microsoft 365 Apps for Enterprise, specifically targeting OneNote version 16.0.1. 2. Implement strict local access controls and limit user permissions to reduce the risk of unauthorized local exploitation. 3. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and prevent suspicious activities related to OneNote. 4. Educate users about the risks of interacting with untrusted content within OneNote and enforce policies to restrict the opening of unknown or suspicious files. 5. Conduct regular audits of local user accounts and access logs to identify potential insider threats or compromised endpoints. 6. Use network segmentation to isolate critical systems and reduce the impact of a local compromise. 7. Consider disabling or restricting OneNote usage in high-risk environments until patches are applied. 8. Integrate vulnerability management processes to track and remediate this and similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-11T22:56:43.943Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebc57

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:31:08 AM

Last updated: 3/24/2026, 9:00:35 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses