Impact
Microsoft Word allows an attacker to provide an external file name or path that bypasses normal access control, enabling the disclosure of sensitive information on a network. The weakness is a classic external control of file or directory path scenario (CWE‑73). An exploit could allow an unauthenticated user to read arbitrary files accessible to the host, potentially leaking confidential data.
Affected Systems
The vulnerability affects Microsoft 365 Apps for Enterprise, Microsoft Office 2019, Microsoft Office LTSC 2021, Microsoft Office LTSC 2024, and Microsoft Word 2016. No specific version ranges are listed, so all currently installed instances of the above products are considered vulnerable until upgraded.
Risk and Exploitability
The CVSS score of 4.3 indicates a moderate severity with limited impact on confidentiality and availability. EPSS data is not available, and the vulnerability is not listed in CISA KEV. The likely attack vector is remote access; an attacker who can influence the file name or path seen by Word can exploit the flaw over the network. Because the vulnerability requires only external file path manipulation, the conditions for exploitation are relatively low, but the potential for sensitive data exposure remains. Overall risk is moderate, warranting monitoring and prompt remediation as part of a broader vulnerability management strategy.
OpenCVE Enrichment