Description
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Published: 2026-05-12
Score: 7.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A memory management flaw in Microsoft Office Excel allows an attacker to trigger a use‑after‑free condition, enabling the execution of arbitrary code when a document is opened. The vulnerability falls under CWE‑416, meaning unauthorized local code execution can occur, potentially giving the attacker control over the victim’s machine, the ability to install malware, or to modify or delete data. The impact is limited to the context in which the file is opened, but because Excel documents are often shared, the risk of widespread compromise is significant.

Affected Systems

Affected products include Microsoft 365 Apps for Enterprise, Microsoft Excel 2016, Microsoft Office 2019, Microsoft Office LTSC 2021, Microsoft Office LTSC 2024, Microsoft Office LTSC for Mac 2021, Microsoft Office LTSC for Mac 2024, and Office Online Server. All currently supported versions of these products are vulnerable, as the same code path is used across the different releases.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity, and while the EPSS score is not listed, the absence of a KEV mark does not reduce the confidence that this flaw can be abused. The likely attack vector is that an attacker crafts a malicious Office file that, when opened by a user on a vulnerable system, causes the use‑after‑free to hand control to the attacker's code. The exploit is local and requires user interaction, but given the ubiquity of file sharing, manual exploitation rates could be high once the flaw is discovered publicly.

Generated by OpenCVE AI on May 12, 2026 at 19:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Security Update for Microsoft Office from the official Microsoft Update Guide corresponding to the affected product version.
  • Avoid opening unknown or untrusted Office files; implement a policy that blocks automatic opening of files from untrusted locations, and disable macros and other potentially dangerous active content unless explicitly required.
  • If a patch cannot be applied immediately, configure the operating system’s least‑privilege settings for the Excel application, such as running Excel under a restricted user context or using Office app protection policies that limit file access and execution of external content.

Generated by OpenCVE AI on May 12, 2026 at 19:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft office Online Server
Vendors & Products Microsoft office Online Server

Tue, 12 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Title Microsoft Excel Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft 365 Apps
Microsoft excel 2016
Microsoft office 2019
Microsoft office 2021
Microsoft office 2024
Microsoft office Macos 2021
Microsoft office Macos 2024
Weaknesses CWE-416
CPEs cpe:2.3:a:microsoft:365_apps:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:microsoft:excel_2016:*:*:*:*:*:*:x86:*
cpe:2.3:a:microsoft:office_2019:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_2021:*:*:*:*:long_term_servicing_channel:*:*:*
cpe:2.3:a:microsoft:office_2021:*:*:*:*:ltsc:*:*:*
cpe:2.3:a:microsoft:office_2024:*:*:*:*:long_term_servicing_channel:*:*:*
cpe:2.3:a:microsoft:office_macos_2021:*:*:*:*:*:long_term_servicing_channel:*:*
cpe:2.3:a:microsoft:office_macos_2024:*:*:*:*:*:long_term_servicing_channel:*:*
Vendors & Products Microsoft
Microsoft 365 Apps
Microsoft excel 2016
Microsoft office 2019
Microsoft office 2021
Microsoft office 2024
Microsoft office Macos 2021
Microsoft office Macos 2024
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft 365 Apps Excel 2016 Office 2019 Office 2021 Office 2024 Office Macos 2021 Office Macos 2024 Office Online Server
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-05-12T19:15:41.724Z

Reserved: 2026-04-11T23:06:15.614Z

Link: CVE-2026-40359

cve-icon Vulnrichment

Updated: 2026-05-12T19:15:29.136Z

cve-icon NVD

Status : Received

Published: 2026-05-12T18:17:14.673

Modified: 2026-05-12T18:17:14.673

Link: CVE-2026-40359

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T20:30:23Z

Weaknesses