CVE-2025-53784

Microsoft · Microsoft Multiple Products

A high-severity vulnerability has been discovered in Microsoft Word that could allow an attacker to take control of a user's computer.

Executive summary

A high-severity vulnerability has been discovered in Microsoft Word that could allow an attacker to take control of a user's computer. If a user is tricked into opening a specially crafted malicious Word document, an attacker could execute code to install malware, steal sensitive data, or gain a foothold to move deeper into the corporate network. This flaw represents a significant risk to organizational security and requires immediate attention.

Vulnerability

This is a use-after-free memory corruption vulnerability within Microsoft Office Word. An attacker can exploit this by creating a malicious Word document containing specially crafted objects. When a user opens this file, Word improperly handles memory that has already been deallocated, allowing the attacker to write to that memory location and execute arbitrary code with the same permissions as the logged-in user.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.4. Successful exploitation could have a severe impact on the business, leading to a complete compromise of the affected user's workstation. Potential consequences include the deployment of ransomware, theft of sensitive corporate data and intellectual property, and the establishment of a persistent presence within the network. A compromised endpoint can serve as a pivot point for attackers to move laterally, escalating the incident from a single-system compromise to a widespread network breach.

Remediation

Immediate Action: Apply the security updates released by Microsoft immediately across all affected systems. Utilize centralized patch management tools like WSUS or Microsoft Endpoint Configuration Manager to ensure timely and complete deployment. Prioritize patching for workstations of high-value users, such as executives and IT administrators.

Proactive Monitoring: Security teams should actively monitor for signs of exploitation. This includes looking for suspicious child processes spawning from winword.exe (e.g., powershell.exe, cmd.exe, wscript.exe) in EDR and SIEM logs. Monitor network traffic for unusual outbound connections from workstations to unknown destinations and review Windows Event Logs for application crashes related to Microsoft Word.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce risk. Enable Microsoft Defender Attack Surface Reduction (ASR) rules that block Office applications from creating child processes. Ensure Microsoft Office Protected View is enabled by default for documents originating from the internet, as this can prevent the exploit from executing automatically.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to the high severity (CVSS 8.4) of this vulnerability and its potential for remote code execution, we strongly recommend that organizations prioritize the immediate deployment of the vendor-supplied patches. Although CVE-2025-53784 is not currently on the CISA KEV list, the ubiquity of Microsoft Word makes it an attractive target, and active exploitation could begin without warning. Taking immediate action is the most effective way to mitigate the risk of system compromise, data theft, and further network intrusion.