CVE-2025-59240: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Microsoft Office LTSC 2021
Exposure of sensitive information to an unauthorized actor in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
AI Analysis
Technical Summary
CVE-2025-59240 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting Microsoft Office LTSC 2021, specifically the Excel component version 16.0.1. The vulnerability allows an attacker with local access to the affected system to disclose sensitive information without requiring any privileges (PR:N) but does require user interaction (UI:R), such as opening a crafted Excel file or triggering a specific action within Excel. The attack vector is local (AV:L), meaning remote exploitation is not possible without prior access. The vulnerability does not impact integrity or availability, focusing solely on confidentiality (C:H, I:N, A:N). The CVSS v3.1 base score is 5.5, indicating medium severity. No known exploits have been reported in the wild, and no patches have been published at the time of analysis. The vulnerability likely arises from improper handling of sensitive data within Excel, potentially exposing data stored in memory or temporary files to unauthorized local users. Given the nature of the vulnerability, it is primarily a risk in environments where multiple users share systems or where local attackers can gain access to user sessions. The vulnerability was reserved in September 2025 and published in November 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, the primary impact of CVE-2025-59240 is the potential unauthorized disclosure of sensitive or confidential information stored or processed within Microsoft Excel files on affected systems. This could include intellectual property, financial data, or personal data protected under GDPR, leading to compliance risks and reputational damage. Since exploitation requires local access and user interaction, the threat is more significant in environments with shared workstations, insufficient endpoint security, or insider threats. The lack of impact on integrity and availability reduces the risk of operational disruption but does not diminish the confidentiality concerns. Organizations in sectors such as finance, government, healthcare, and critical infrastructure, where sensitive data is handled extensively in Excel, are particularly at risk. The absence of known exploits and patches means organizations must proactively manage risk until updates are available. Failure to mitigate could result in data breaches and regulatory penalties under European data protection laws.
Mitigation Recommendations
1. Restrict local access to systems running Microsoft Office LTSC 2021, especially version 16.0.1, to trusted users only. 2. Implement strict user session controls and endpoint security measures to prevent unauthorized local access or privilege escalation. 3. Educate users about the risks of opening untrusted Excel files and enforce policies to avoid executing unknown or suspicious documents. 4. Monitor systems for unusual file access or process behavior related to Excel to detect potential exploitation attempts. 5. Once Microsoft releases patches or updates addressing CVE-2025-59240, prioritize immediate deployment across all affected systems. 6. Employ data encryption and data loss prevention (DLP) solutions to minimize exposure of sensitive information even if local access is compromised. 7. Conduct regular audits of shared workstations and implement session timeout policies to reduce the window of opportunity for local attackers. 8. Consider application whitelisting or sandboxing Excel to limit the impact of malicious files or actions. These measures go beyond generic advice by focusing on local access control, user behavior, and proactive monitoring tailored to the vulnerability's characteristics.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Ireland
CVE-2025-59240: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Microsoft Office LTSC 2021
Description
Exposure of sensitive information to an unauthorized actor in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
AI-Powered Analysis
Technical Analysis
CVE-2025-59240 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting Microsoft Office LTSC 2021, specifically the Excel component version 16.0.1. The vulnerability allows an attacker with local access to the affected system to disclose sensitive information without requiring any privileges (PR:N) but does require user interaction (UI:R), such as opening a crafted Excel file or triggering a specific action within Excel. The attack vector is local (AV:L), meaning remote exploitation is not possible without prior access. The vulnerability does not impact integrity or availability, focusing solely on confidentiality (C:H, I:N, A:N). The CVSS v3.1 base score is 5.5, indicating medium severity. No known exploits have been reported in the wild, and no patches have been published at the time of analysis. The vulnerability likely arises from improper handling of sensitive data within Excel, potentially exposing data stored in memory or temporary files to unauthorized local users. Given the nature of the vulnerability, it is primarily a risk in environments where multiple users share systems or where local attackers can gain access to user sessions. The vulnerability was reserved in September 2025 and published in November 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, the primary impact of CVE-2025-59240 is the potential unauthorized disclosure of sensitive or confidential information stored or processed within Microsoft Excel files on affected systems. This could include intellectual property, financial data, or personal data protected under GDPR, leading to compliance risks and reputational damage. Since exploitation requires local access and user interaction, the threat is more significant in environments with shared workstations, insufficient endpoint security, or insider threats. The lack of impact on integrity and availability reduces the risk of operational disruption but does not diminish the confidentiality concerns. Organizations in sectors such as finance, government, healthcare, and critical infrastructure, where sensitive data is handled extensively in Excel, are particularly at risk. The absence of known exploits and patches means organizations must proactively manage risk until updates are available. Failure to mitigate could result in data breaches and regulatory penalties under European data protection laws.
Mitigation Recommendations
1. Restrict local access to systems running Microsoft Office LTSC 2021, especially version 16.0.1, to trusted users only. 2. Implement strict user session controls and endpoint security measures to prevent unauthorized local access or privilege escalation. 3. Educate users about the risks of opening untrusted Excel files and enforce policies to avoid executing unknown or suspicious documents. 4. Monitor systems for unusual file access or process behavior related to Excel to detect potential exploitation attempts. 5. Once Microsoft releases patches or updates addressing CVE-2025-59240, prioritize immediate deployment across all affected systems. 6. Employ data encryption and data loss prevention (DLP) solutions to minimize exposure of sensitive information even if local access is compromised. 7. Conduct regular audits of shared workstations and implement session timeout policies to reduce the window of opportunity for local attackers. 8. Consider application whitelisting or sandboxing Excel to limit the impact of malicious files or actions. These measures go beyond generic advice by focusing on local access control, user behavior, and proactive monitoring tailored to the vulnerability's characteristics.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-09-11T04:30:28.169Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69137c4747ab3590319da059
Added to database: 11/11/2025, 6:11:19 PM
Last enriched: 11/18/2025, 7:15:18 PM
Last updated: 11/22/2025, 10:21:31 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13318: CWE-862 Missing Authorization in codepeople Booking Calendar Contact Form
MediumCVE-2025-13136: CWE-862 Missing Authorization in westerndeal GSheetConnector For Ninja Forms
MediumCVE-2025-13384: CWE-862 Missing Authorization in codepeople CP Contact Form with PayPal
HighCVE-2025-13317: CWE-862 Missing Authorization in codepeople Appointment Booking Calendar
MediumCVE-2025-12877: CWE-862 Missing Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.