Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62552: CWE-23: Relative Path Traversal in Microsoft Microsoft 365 Apps for Enterprise

0
High
VulnerabilityCVE-2025-62552cvecve-2025-62552cwe-23
Published: Tue Dec 09 2025 (12/09/2025, 17:55:55 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft 365 Apps for Enterprise

Description

Relative path traversal in Microsoft Office Access allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 00:25:37 UTC

Technical Analysis

CVE-2025-62552 is a relative path traversal vulnerability classified under CWE-23, affecting Microsoft Office Access within Microsoft 365 Apps for Enterprise version 16.0.1. Relative path traversal vulnerabilities occur when an application improperly sanitizes user-supplied file path input, allowing attackers to manipulate file paths to access unintended directories or files. In this case, the vulnerability enables an unauthorized attacker to execute arbitrary code locally by crafting malicious input that causes the application to load or execute files from unintended locations. The vulnerability does not require prior privileges (PR:N) but does require user interaction (UI:R), such as opening a malicious file or document. The attack vector is local (AV:L), meaning the attacker must have local access to the system. The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H), indicating that successful exploitation can lead to full system compromise, including data theft, modification, or denial of service. The CVSS vector also indicates the scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. No known exploits have been reported in the wild yet, but the vulnerability is publicly disclosed and assigned a high severity score of 7.8. Microsoft has not yet released a patch, so mitigation currently relies on limiting exposure and applying best practices. Given the widespread deployment of Microsoft 365 Apps for Enterprise in corporate environments, this vulnerability represents a significant risk if exploited.

Potential Impact

The potential impact of CVE-2025-62552 is substantial for organizations worldwide. Successful exploitation allows attackers to execute arbitrary code locally, which can lead to full system compromise. This includes unauthorized access to sensitive data, installation of persistent malware, privilege escalation, and disruption of business operations. Since Microsoft 365 Apps for Enterprise is widely used in enterprises, government agencies, and critical infrastructure, the vulnerability could be leveraged to target high-value assets and intellectual property. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments where users frequently open documents from untrusted sources or where insider threats exist. The vulnerability could also be chained with other exploits to achieve remote code execution or lateral movement within networks. The absence of a patch increases the urgency for organizations to implement compensating controls to reduce attack surface and monitor for suspicious activity.

Mitigation Recommendations

1. Apply patches promptly once Microsoft releases an official fix for CVE-2025-62552. Monitor Microsoft security advisories closely. 2. Until a patch is available, restrict local user permissions to the minimum necessary to reduce the risk of exploitation. 3. Implement application whitelisting to prevent unauthorized code execution. 4. Educate users to avoid opening documents or files from untrusted or unknown sources, minimizing the chance of triggering the vulnerability. 5. Employ endpoint detection and response (EDR) solutions to monitor for anomalous behavior indicative of exploitation attempts, such as unexpected file access or code execution. 6. Use file integrity monitoring to detect unauthorized changes to critical files or directories. 7. Enforce strict network segmentation to limit lateral movement if local compromise occurs. 8. Regularly audit and harden Microsoft 365 configurations and access controls to reduce attack surface. 9. Consider disabling or restricting Microsoft Access usage in environments where it is not essential.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-10-15T17:11:21.219Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693867e574ebaa3babafb3a3

Added to database: 12/9/2025, 6:18:13 PM

Last enriched: 3/1/2026, 12:25:37 AM

Last updated: 3/25/2026, 7:51:50 AM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses