Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64677: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Office Out-of-Box Experience

0
High
VulnerabilityCVE-2025-64677cvecve-2025-64677cwe-79
Published: Thu Dec 18 2025 (12/18/2025, 22:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Office Out-of-Box Experience

Description

Improper neutralization of input during web page generation ('cross-site scripting') in Office Out-of-Box Experience allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:40:32 UTC

Technical Analysis

CVE-2025-64677 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in the Microsoft Office Out-of-Box Experience (OOBE) component. This vulnerability occurs due to improper neutralization of input during the generation of web pages within the OOBE process, which is part of the initial setup and configuration experience for Microsoft Office products. An attacker can exploit this flaw remotely over a network without requiring any privileges or user interaction, making it particularly dangerous. The vulnerability allows injection of malicious scripts that can execute in the context of the affected application, leading to spoofing attacks that may compromise confidentiality by stealing sensitive data or session tokens. The CVSS v3.1 base score is 8.2, reflecting high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact primarily affects confidentiality (high), with limited integrity impact and no availability impact. Although no exploits have been reported in the wild yet, the vulnerability’s characteristics make it a prime candidate for exploitation once weaponized. The lack of currently available patches necessitates proactive mitigation strategies. The vulnerability affects all versions of Microsoft Office that include the OOBE component, which is widely deployed globally in enterprise and consumer environments.

Potential Impact

The potential impact of CVE-2025-64677 is significant for organizations worldwide that deploy Microsoft Office. Successful exploitation can lead to unauthorized disclosure of sensitive information, including user credentials, configuration data, or other confidential information accessible during the OOBE process. This can facilitate further attacks such as phishing, session hijacking, or lateral movement within corporate networks. Since the attack requires no authentication or user interaction, it can be executed remotely and stealthily, increasing the risk of widespread compromise. Enterprises relying heavily on Microsoft Office for productivity and collaboration may face data breaches, reputational damage, and regulatory compliance issues. The vulnerability could also be leveraged in targeted attacks against high-value organizations or government entities. Although availability is not impacted, the confidentiality breach alone warrants urgent remediation. The absence of known exploits currently provides a window for defense, but the ease of exploitation and network exposure make rapid mitigation critical.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches or updates for the Office Out-of-Box Experience component immediately upon release. 2. Until patches are available, restrict network access to systems during the Office setup process to trusted networks only, minimizing exposure to untrusted or public networks. 3. Implement strict input validation and sanitization controls on any custom scripts or web content integrated with Office OOBE if applicable. 4. Deploy Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the affected environment. 5. Use network-level protections such as web application firewalls (WAFs) configured to detect and block XSS attack patterns targeting Office OOBE endpoints. 6. Educate IT staff and users about the risks of spoofing and suspicious network activity during Office setup phases. 7. Conduct regular security assessments and penetration testing focused on Office deployment environments to identify and remediate similar vulnerabilities proactively. 8. Maintain robust endpoint detection and response (EDR) solutions to detect anomalous script execution or network behavior indicative of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-11-06T23:40:37.277Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69447c134eb3efac36aec210

Added to database: 12/18/2025, 10:11:31 PM

Last enriched: 2/28/2026, 2:40:32 PM

Last updated: 3/24/2026, 12:11:33 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses