Description
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
Published: 2026-04-14
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

This vulnerability is a Use‑After‑Free flaw that can be triggered when Microsoft Word processes a specially crafted document or content. The flaw allows the attacker to execute arbitrary code in the current user’s context, potentially granting full system control, data exfiltration or destructive actions. The weakness is classified as CWE‑416 and indicates that freed memory is accessed, leading to memory corruption. Based on the description, the attacker would need the victim to open a malicious Word file, making the exploit locally triggered by user action.

Affected Systems

Affected Microsoft products include Microsoft 365 Apps for Enterprise, Microsoft Office LTSC 2021 and 2024, and the Mac editions of Office LTSC 2021 and 2024. The CVE entry does not specify which exact release or build numbers are impacted, so all active versions of those products are considered at risk until an update is applied.

Risk and Exploitability

The CVSS score of 8.4 signifies a high‑severity flaw. EPSS information is unavailable, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector requires the victim to open a malicious Word document, meaning that users who handle untrusted files are at risk. Organizations should treat this as a critical exposure that could lead to local privilege escalation and data compromise if exploited.

Generated by OpenCVE AI on April 14, 2026 at 19:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest security update for Microsoft Office and Microsoft 365 Apps for Enterprise as published by Microsoft.
  • Verify the update installation through the Office update status page or update logs.
  • Avoid opening untrusted Word documents until the patch is applied.
  • If immediate update is not possible, isolate affected systems and block remote execution of Office documents from unknown sources.

Generated by OpenCVE AI on April 14, 2026 at 19:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft office Long Term Servicing Channel
CPEs cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*
cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*
Vendors & Products Microsoft office Long Term Servicing Channel

Wed, 15 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
Title Microsoft Word Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft 365 Apps
Microsoft office 2021
Microsoft office 2024
Microsoft office Macos 2021
Microsoft office Macos 2024
Weaknesses CWE-416
CPEs cpe:2.3:a:microsoft:365_apps:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:microsoft:office_2021:*:*:*:*:long_term_servicing_channel:*:*:*
cpe:2.3:a:microsoft:office_2024:*:*:*:*:long_term_servicing_channel:*:*:*
cpe:2.3:a:microsoft:office_macos_2021:*:*:*:*:*:long_term_servicing_channel:*:*
cpe:2.3:a:microsoft:office_macos_2024:*:*:*:*:*:long_term_servicing_channel:*:*
Vendors & Products Microsoft
Microsoft 365 Apps
Microsoft office 2021
Microsoft office 2024
Microsoft office Macos 2021
Microsoft office Macos 2024
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft 365 Apps Office 2021 Office 2024 Office Long Term Servicing Channel Office Macos 2021 Office Macos 2024
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-30T14:42:36.765Z

Reserved: 2026-03-17T20:15:23.721Z

Link: CVE-2026-33115

cve-icon Vulnrichment

Updated: 2026-04-15T09:07:46.758Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-14T18:17:33.707

Modified: 2026-04-29T19:13:22.397

Link: CVE-2026-33115

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:41:09Z

Weaknesses