CVE-2025-30375: CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') in Microsoft Office Online Server
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
AI Analysis
Technical Summary
CVE-2025-30375 is a high-severity vulnerability classified under CWE-843 (Access of Resource Using Incompatible Type, commonly known as 'type confusion') affecting Microsoft Office Online Server version 1.0.0. This vulnerability arises from improper handling of data types within Microsoft Office Excel components of the Office Online Server, allowing an attacker to exploit type confusion to gain unauthorized access to resources. Specifically, the flaw enables an attacker to execute arbitrary code locally on the affected system. The vulnerability requires local access (Attack Vector: Local) and no privileges (PR: None), but does require user interaction (UI: Required), such as opening a maliciously crafted Excel file through the Office Online Server interface. The vulnerability impacts confidentiality, integrity, and availability, all rated high, indicating that successful exploitation could lead to full system compromise. The CVSS v3.1 base score is 7.8, reflecting a high severity level. No known exploits are currently reported in the wild, and no patches have been linked yet, though the vulnerability was published on May 13, 2025, with reservation dating back to March 21, 2025. The vulnerability is significant because Office Online Server is widely used in enterprise environments to provide browser-based access to Microsoft Office documents, and a local code execution vulnerability could allow attackers to escalate privileges or move laterally within a network after initial access.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for enterprises and public sector entities that rely on Microsoft Office Online Server to provide collaborative document editing and viewing capabilities. Exploitation could lead to unauthorized code execution on servers hosting Office Online Server, potentially compromising sensitive corporate or governmental data. This could result in data breaches, disruption of business operations, and loss of trust. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to trick users into opening malicious Excel files, increasing the attack surface. Additionally, given the high impact on confidentiality, integrity, and availability, successful exploitation could facilitate ransomware deployment, espionage, or sabotage. The lack of known exploits in the wild currently provides a window for mitigation, but the high severity score indicates that organizations should act promptly to prevent exploitation.
Mitigation Recommendations
European organizations should implement the following specific mitigation steps: 1) Immediately monitor for updates and patches from Microsoft for Office Online Server version 1.0.0 and apply them as soon as they become available. 2) Restrict local access to servers running Office Online Server to trusted administrators only, minimizing the risk of local exploitation. 3) Implement strict user training and awareness programs to reduce the likelihood of users opening malicious Excel files, including phishing simulations focused on Office document threats. 4) Employ network segmentation to isolate Office Online Server infrastructure from critical systems to limit lateral movement in case of compromise. 5) Utilize endpoint detection and response (EDR) solutions to monitor for suspicious activities indicative of exploitation attempts, such as unusual process creation or code execution related to Office Online Server processes. 6) Review and tighten file upload and document handling policies within Office Online Server to detect and block potentially malicious files. 7) Conduct regular vulnerability assessments and penetration testing focused on Office Online Server deployments to identify and remediate configuration weaknesses.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-30375: CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') in Microsoft Office Online Server
Description
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
AI-Powered Analysis
Technical Analysis
CVE-2025-30375 is a high-severity vulnerability classified under CWE-843 (Access of Resource Using Incompatible Type, commonly known as 'type confusion') affecting Microsoft Office Online Server version 1.0.0. This vulnerability arises from improper handling of data types within Microsoft Office Excel components of the Office Online Server, allowing an attacker to exploit type confusion to gain unauthorized access to resources. Specifically, the flaw enables an attacker to execute arbitrary code locally on the affected system. The vulnerability requires local access (Attack Vector: Local) and no privileges (PR: None), but does require user interaction (UI: Required), such as opening a maliciously crafted Excel file through the Office Online Server interface. The vulnerability impacts confidentiality, integrity, and availability, all rated high, indicating that successful exploitation could lead to full system compromise. The CVSS v3.1 base score is 7.8, reflecting a high severity level. No known exploits are currently reported in the wild, and no patches have been linked yet, though the vulnerability was published on May 13, 2025, with reservation dating back to March 21, 2025. The vulnerability is significant because Office Online Server is widely used in enterprise environments to provide browser-based access to Microsoft Office documents, and a local code execution vulnerability could allow attackers to escalate privileges or move laterally within a network after initial access.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for enterprises and public sector entities that rely on Microsoft Office Online Server to provide collaborative document editing and viewing capabilities. Exploitation could lead to unauthorized code execution on servers hosting Office Online Server, potentially compromising sensitive corporate or governmental data. This could result in data breaches, disruption of business operations, and loss of trust. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to trick users into opening malicious Excel files, increasing the attack surface. Additionally, given the high impact on confidentiality, integrity, and availability, successful exploitation could facilitate ransomware deployment, espionage, or sabotage. The lack of known exploits in the wild currently provides a window for mitigation, but the high severity score indicates that organizations should act promptly to prevent exploitation.
Mitigation Recommendations
European organizations should implement the following specific mitigation steps: 1) Immediately monitor for updates and patches from Microsoft for Office Online Server version 1.0.0 and apply them as soon as they become available. 2) Restrict local access to servers running Office Online Server to trusted administrators only, minimizing the risk of local exploitation. 3) Implement strict user training and awareness programs to reduce the likelihood of users opening malicious Excel files, including phishing simulations focused on Office document threats. 4) Employ network segmentation to isolate Office Online Server infrastructure from critical systems to limit lateral movement in case of compromise. 5) Utilize endpoint detection and response (EDR) solutions to monitor for suspicious activities indicative of exploitation attempts, such as unusual process creation or code execution related to Office Online Server processes. 6) Review and tighten file upload and document handling policies within Office Online Server to detect and block potentially malicious files. 7) Conduct regular vulnerability assessments and penetration testing focused on Office Online Server deployments to identify and remediate configuration weaknesses.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-03-21T19:09:29.813Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aeb9d9
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/18/2025, 9:06:52 PM
Last updated: 8/18/2025, 11:34:28 PM
Views: 19
Related Threats
CVE-2025-57896: CWE-862 Missing Authorization in andy_moyle Church Admin
MediumCVE-2025-57895: CWE-352 Cross-Site Request Forgery (CSRF) in Hossni Mubarak JobWP
MediumCVE-2025-57894: CWE-862 Missing Authorization in ollybach WPPizza
MediumCVE-2025-57893: CWE-352 Cross-Site Request Forgery (CSRF) in Epsiloncool WP Fast Total Search
MediumCVE-2025-57892: CWE-352 Cross-Site Request Forgery (CSRF) in Jeff Starr Simple Statistics for Feeds
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.