Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64677: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Office Out-of-Box Experience

0
High
VulnerabilityCVE-2025-64677cvecve-2025-64677cwe-79
Published: Thu Dec 18 2025 (12/18/2025, 22:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Office Out-of-Box Experience

Description

Improper neutralization of input during web page generation ('cross-site scripting') in Office Out-of-Box Experience allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

AILast updated: 01/28/2026, 19:12:07 UTC

Technical Analysis

CVE-2025-64677 is a cross-site scripting (XSS) vulnerability categorized under CWE-79, found in the Microsoft Office Out-of-Box Experience (OOBE) component. This vulnerability stems from improper neutralization of user-supplied input during the generation of web pages within the OOBE process. Because the OOBE is part of the initial setup and configuration phase of Microsoft Office, it is often executed in environments where security controls may be less stringent. The flaw allows an attacker to inject malicious scripts that execute in the context of the victim's browser or Office environment, enabling spoofing attacks over a network without requiring any authentication or user interaction. The CVSS v3.1 score of 8.2 reflects a high severity, with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality is high, as attackers can potentially steal sensitive information or session tokens, while integrity impact is low and availability is unaffected. No patches have been released yet, and no known exploits are reported in the wild, but the vulnerability's presence in a widely deployed Microsoft product makes it a significant concern. The vulnerability is particularly dangerous because it can be exploited remotely and silently during the Office setup process, potentially affecting enterprise environments where Office deployment is common.

Potential Impact

For European organizations, the impact of CVE-2025-64677 can be substantial. The high confidentiality impact means that sensitive corporate data, credentials, or session information could be exposed to attackers, leading to data breaches or unauthorized access. Since the vulnerability allows spoofing attacks, attackers could impersonate legitimate Office setup interfaces or inject malicious content, potentially tricking users or automated systems into executing harmful actions. This can undermine trust in the Office deployment process and may facilitate further attacks such as phishing or lateral movement within corporate networks. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased risk of compliance violations and reputational damage. The lack of required user interaction and privileges lowers the barrier for exploitation, increasing the likelihood of successful attacks in automated or large-scale deployment scenarios common in European enterprises.

Mitigation Recommendations

Given the absence of an official patch at this time, European organizations should implement immediate compensating controls. These include: 1) Monitoring network traffic for anomalous or suspicious requests targeting Office OOBE web components, using intrusion detection/prevention systems (IDS/IPS) with updated signatures. 2) Applying strict Content Security Policy (CSP) rules where feasible to limit script execution during Office setup phases. 3) Restricting network access to Office OOBE services to trusted internal networks or VPNs to reduce exposure to external attackers. 4) Educating IT staff and users about the risks of spoofed Office setup interfaces and encouraging verification of setup sources. 5) Preparing for rapid deployment of Microsoft patches once released by maintaining an up-to-date asset inventory and patch management process. 6) Employing endpoint detection and response (EDR) tools to detect unusual script execution or process behavior during Office installation. These targeted mitigations go beyond generic advice by focusing on the specific attack vector and environment of the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-11-06T23:40:37.277Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69447c134eb3efac36aec210

Added to database: 12/18/2025, 10:11:31 PM

Last enriched: 1/28/2026, 7:12:07 PM

Last updated: 2/7/2026, 7:19:51 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats