Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64405: CWE-862 Missing Authorization in Apache Software Foundation Apache OpenOffice

0
High
VulnerabilityCVE-2025-64405cvecve-2025-64405cwe-862
Published: Wed Nov 12 2025 (11/12/2025, 09:10:35 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache OpenOffice

Description

Apache OpenOffice documents can contain links. A missing Authorization vulnerability in Apache OpenOffice allowed an attacker to craft a document that would cause external links to be loaded without prompt. In the affected versions of Apache OpenOffice, Calc spreadsheet containing DDE links to external files would load the contents of those files without prompting the user for permission to do so. This issue affects Apache OpenOffice: through 4.1.15. Users are recommended to upgrade to version 4.1.16, which fixes the issue.

AI-Powered Analysis

AILast updated: 11/19/2025, 10:00:20 UTC

Technical Analysis

CVE-2025-64405 is a missing authorization vulnerability classified under CWE-862 found in Apache OpenOffice, specifically affecting versions through 4.1.15. The vulnerability arises because Apache OpenOffice Calc spreadsheets can contain Dynamic Data Exchange (DDE) links to external files, which are loaded automatically without prompting the user for permission. This lack of authorization checking allows an attacker to craft a malicious spreadsheet document that, when opened, silently loads external file contents. This behavior can lead to unauthorized disclosure of sensitive information or manipulation of data integrity by injecting or loading unintended content. The vulnerability is remotely exploitable without requiring any privileges or user interaction, as simply opening the crafted document triggers the exploit. The CVSS v3.1 base score is 7.5, indicating high severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N, meaning network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, no confidentiality impact but high integrity impact, and no availability impact. The issue is resolved in Apache OpenOffice version 4.1.16, which introduces proper authorization checks before loading external links in Calc documents. No known exploits have been reported in the wild to date, but the vulnerability's characteristics make it a significant risk, especially in environments where untrusted documents are opened.

Potential Impact

For European organizations, this vulnerability poses a significant risk to data integrity and confidentiality. Attackers can exploit this flaw to inject or load malicious external content into spreadsheets without user awareness, potentially leading to unauthorized data manipulation or leakage. Sectors that heavily rely on Apache OpenOffice for document processing, including government agencies, educational institutions, and small to medium enterprises, may be particularly vulnerable. The lack of user prompts increases the risk of silent exploitation, which can facilitate advanced persistent threats or insider attacks. Although availability is not affected, the integrity compromise could disrupt business processes, lead to regulatory non-compliance (e.g., GDPR concerns regarding data exposure), and damage organizational reputation. The vulnerability's ease of exploitation and network accessibility make it a viable vector for widespread attacks if weaponized. Organizations with automated document processing workflows or those that accept documents from external sources are at elevated risk.

Mitigation Recommendations

European organizations should prioritize upgrading Apache OpenOffice installations to version 4.1.16 or later, where the vulnerability is patched. Until upgrades are completed, implement strict document handling policies that restrict opening Calc spreadsheets from untrusted or unknown sources. Deploy endpoint security solutions capable of detecting and blocking malicious document behaviors, including abnormal DDE link activity. Educate users about the risks of opening unsolicited or suspicious documents, emphasizing the importance of verifying document origins. Network-level controls such as sandboxing document processing or isolating document viewers can reduce exposure. Additionally, consider disabling or restricting DDE functionality within Apache OpenOffice if feasible, or employ application whitelisting to prevent unauthorized document execution. Regularly audit and monitor logs for unusual document access or external link loading activities. Finally, maintain up-to-date threat intelligence feeds to detect emerging exploit attempts targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-11-02T09:56:16.204Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691450f332a6693f6a1683ef

Added to database: 11/12/2025, 9:18:43 AM

Last enriched: 11/19/2025, 10:00:20 AM

Last updated: 11/22/2025, 6:10:50 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats