Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21514: CWE-807: Reliance on Untrusted Inputs in a Security Decision in Microsoft Microsoft 365 Apps for Enterprise

0
High
VulnerabilityCVE-2026-21514cvecve-2026-21514cwe-807
Published: Tue Feb 10 2026 (02/10/2026, 17:51:34 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft 365 Apps for Enterprise

Description

Reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally.

AI-Powered Analysis

AILast updated: 02/18/2026, 08:39:48 UTC

Technical Analysis

CVE-2026-21514 is a vulnerability classified under CWE-807, indicating reliance on untrusted inputs in a security decision within Microsoft Office Word, part of Microsoft 365 Apps for Enterprise. This flaw allows an unauthorized local attacker to bypass security features by manipulating inputs that the application trusts incorrectly. The vulnerability affects version 16.0.1 of the software and does not require any privileges or elevated permissions to exploit, but it does require user interaction, such as opening a malicious document. The CVSS 3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. The vulnerability could allow attackers to execute arbitrary code or escalate privileges locally, potentially leading to full system compromise. No public exploits are known yet, but the functional impact and ease of exploitation make it a critical issue for organizations relying on Microsoft 365 Apps. The vulnerability was reserved at the end of 2025 and published in early 2026, indicating recent discovery and disclosure. The lack of available patches at the time of reporting means organizations must rely on interim mitigations until updates are released. This vulnerability highlights the risks of trusting unvalidated inputs in security decisions within widely used productivity software.

Potential Impact

For European organizations, the impact of CVE-2026-21514 is significant due to the widespread use of Microsoft 365 Apps for Enterprise across public and private sectors. Successful exploitation can lead to unauthorized local privilege escalation, enabling attackers to bypass security controls, execute arbitrary code, and potentially gain full control over affected systems. This compromises sensitive data confidentiality, system integrity, and availability of critical business applications. Sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to their reliance on Microsoft Office tools and the sensitivity of their data. The local attack vector means insider threats or compromised endpoints pose a high risk. The requirement for user interaction (e.g., opening a malicious document) suggests phishing or social engineering could be used to trigger exploitation, increasing the attack surface. The absence of known exploits currently provides a window for proactive defense, but the high severity score underscores the urgency for mitigation. Disruption or data breaches resulting from exploitation could lead to regulatory penalties under GDPR and damage organizational reputation.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches immediately upon release to remediate the vulnerability. 2. Until patches are available, restrict local access to systems running Microsoft 365 Apps for Enterprise to trusted users only, minimizing the risk of local exploitation. 3. Implement application whitelisting and endpoint detection and response (EDR) solutions to detect and block suspicious activities related to document handling and code execution. 4. Educate users on the risks of opening unsolicited or suspicious documents, emphasizing phishing awareness to reduce the likelihood of triggering the vulnerability. 5. Employ network segmentation to limit lateral movement if an endpoint is compromised. 6. Use Microsoft Defender for Office 365 and other email filtering solutions to block malicious documents before reaching end users. 7. Regularly audit and harden local security policies to reduce the attack surface, including disabling unnecessary macros and scripting features in Office applications. 8. Maintain up-to-date backups and incident response plans to quickly recover from potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-30T18:10:54.845Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b76064b57a58fa120a68c

Added to database: 2/10/2026, 6:16:38 PM

Last enriched: 2/18/2026, 8:39:48 AM

Last updated: 2/21/2026, 12:20:09 AM

Views: 339

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats