Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62552: CWE-23: Relative Path Traversal in Microsoft Microsoft Office 2019

0
High
VulnerabilityCVE-2025-62552cvecve-2025-62552cwe-23
Published: Tue Dec 09 2025 (12/09/2025, 17:55:55 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Office 2019

Description

Relative path traversal in Microsoft Office Access allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 12/09/2025, 18:33:30 UTC

Technical Analysis

CVE-2025-62552 is a vulnerability classified under CWE-23 (Relative Path Traversal) affecting Microsoft Office 2019, specifically the Access component. This vulnerability allows an attacker to manipulate relative file paths due to insufficient validation, enabling them to access or execute files outside the intended directory scope. The flaw can be exploited to execute arbitrary code locally, compromising the confidentiality, integrity, and availability of the system. The CVSS 3.1 score of 7.8 reflects a high severity, with an attack vector requiring local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:R). The scope remains unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits have been reported in the wild yet, but the vulnerability is publicly disclosed and should be considered a significant risk. The vulnerability affects Microsoft Office 2019 version 19.0.0, and no patches have been linked yet, indicating that organizations should monitor for updates. The vulnerability could be leveraged by attackers who gain local access, such as through phishing or insider threats, to escalate privileges or execute malicious payloads. Given the widespread use of Microsoft Office in enterprise environments, this vulnerability could have broad implications if exploited.

Potential Impact

For European organizations, the impact of CVE-2025-62552 could be substantial. Microsoft Office 2019 is widely deployed across enterprises, government agencies, and critical infrastructure sectors in Europe. Successful exploitation could lead to unauthorized code execution, enabling attackers to steal sensitive data, disrupt operations, or establish persistence within networks. This is particularly concerning for organizations handling sensitive personal data under GDPR, as breaches could result in regulatory penalties and reputational damage. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments with weak endpoint security or where users may be tricked into opening malicious files. The vulnerability could be exploited in targeted attacks against high-value European targets, including financial institutions, healthcare providers, and public sector entities. The high impact on confidentiality, integrity, and availability underscores the need for urgent mitigation to prevent potential data breaches and operational disruptions.

Mitigation Recommendations

1. Apply official patches from Microsoft as soon as they become available to address CVE-2025-62552. 2. Until patches are released, restrict local user permissions to the minimum necessary to reduce the risk of code execution via path traversal. 3. Implement application whitelisting and endpoint protection solutions that can detect and block suspicious file path manipulations or unauthorized code execution attempts. 4. Educate users about the risks of opening untrusted or unexpected Office Access files, emphasizing caution with email attachments and downloads. 5. Monitor system logs and file system activity for unusual access patterns or attempts to access files outside expected directories. 6. Employ network segmentation to limit the spread of potential compromises originating from exploited endpoints. 7. Use Microsoft Office Protected View and other built-in security features to reduce the risk posed by malicious documents. 8. Regularly review and update security policies related to local access and software usage to ensure compliance with best practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-10-15T17:11:21.219Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693867e574ebaa3babafb3a3

Added to database: 12/9/2025, 6:18:13 PM

Last enriched: 12/9/2025, 6:33:30 PM

Last updated: 12/10/2025, 10:44:33 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats