Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53761: CWE-416: Use After Free in Microsoft Microsoft 365 Apps for Enterprise

0
High
VulnerabilityCVE-2025-53761cvecve-2025-53761cwe-416
Published: Tue Aug 12 2025 (08/12/2025, 17:09:49 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft 365 Apps for Enterprise

Description

Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 10:53:04 UTC

Technical Analysis

CVE-2025-53761 is a use-after-free vulnerability classified under CWE-416, discovered in Microsoft Office PowerPoint component of Microsoft 365 Apps for Enterprise version 16.0.1. This vulnerability arises when the application improperly manages memory, freeing an object while it is still in use, which can lead to execution of arbitrary code by an attacker. The flaw allows an unauthorized attacker to execute code locally by convincing a user to open or interact with a specially crafted PowerPoint file. The vulnerability requires user interaction but does not require any prior privileges, making it accessible to a wide range of attackers. The CVSS v3.1 base score is 7.8, indicating high severity, with metrics showing low attack complexity, no privileges required, but user interaction necessary. The impact on confidentiality, integrity, and availability is high, as successful exploitation could lead to full control over the affected system. Although no public exploits are known at this time, the vulnerability's nature and the widespread use of Microsoft 365 Apps make it a significant threat. The vulnerability was published on August 12, 2025, and no patches have been linked yet, indicating that organizations must remain vigilant and prepare for imminent updates. The vulnerability is particularly concerning for enterprises relying heavily on PowerPoint for presentations and collaboration, as it could be exploited via phishing or malicious document distribution.

Potential Impact

For European organizations, the impact of CVE-2025-53761 is substantial due to the widespread adoption of Microsoft 365 Apps for Enterprise across business, government, and critical infrastructure sectors. Successful exploitation could lead to local code execution, allowing attackers to gain control over affected systems, steal sensitive information, disrupt operations, or move laterally within networks. This could result in data breaches, intellectual property theft, operational downtime, and reputational damage. Sectors such as finance, healthcare, manufacturing, and public administration are particularly vulnerable given their reliance on Microsoft Office tools and the sensitive nature of their data. The requirement for user interaction means that phishing campaigns or malicious file sharing remain primary attack vectors, which are common in targeted attacks against European entities. The lack of known exploits currently provides a window for proactive defense, but the high severity score underscores the urgency for mitigation. Additionally, the potential for exploitation in localized environments increases risks for organizations with less mature cybersecurity hygiene.

Mitigation Recommendations

1. Apply security patches promptly once Microsoft releases updates addressing CVE-2025-53761. Monitor official Microsoft security advisories closely. 2. Implement strict email filtering and attachment scanning to block or quarantine suspicious PowerPoint files, especially from unknown or untrusted sources. 3. Educate users on the risks of opening unsolicited or unexpected PowerPoint presentations and encourage verification of file origins. 4. Employ application control and sandboxing technologies to restrict execution of unauthorized code and isolate PowerPoint processes. 5. Use endpoint detection and response (EDR) solutions to monitor for anomalous behaviors indicative of exploitation attempts. 6. Disable or restrict macros and embedded content in PowerPoint files where feasible, as these can be leveraged in exploitation chains. 7. Enforce the principle of least privilege on user accounts to limit the impact of successful local code execution. 8. Regularly back up critical data and verify recovery procedures to minimize operational disruption in case of compromise. 9. Review and update incident response plans to include scenarios involving exploitation of Office application vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-09T13:25:25.499Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774ead5a09ad00349272

Added to database: 8/12/2025, 5:18:06 PM

Last enriched: 2/14/2026, 10:53:04 AM

Last updated: 3/26/2026, 7:45:00 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses