CVE-2025-47176

'.../...//' in Microsoft Office Outlook allows an authorized attacker to execute code locally.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*
cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:*:x64:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:*:x86:*

History

01 Jul 2025, 16:50

Type Values Removed Values Added
First Time Microsoft office Long Term Servicing Channel
CPE cpe:2.3:a:microsoft:office:2024:*:*:*:ltsc:*:x64:*
cpe:2.3:a:microsoft:office:2024:*:*:*:ltsc:*:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:*:x64:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:*:x86:*

17 Jun 2025, 20:36

Type Values Removed Values Added
References () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47176 - () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47176 - Vendor Advisory
First Time Microsoft 365 Apps
Microsoft office
Microsoft
CPE cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*
cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*
cpe:2.3:a:microsoft:office:2024:*:*:*:ltsc:*:x64:*
cpe:2.3:a:microsoft:office:2024:*:*:*:ltsc:*:x86:*

12 Jun 2025, 16:06

Type Values Removed Values Added
Summary
  • (es) .../...//' en Microsoft Office Outlook permite que un atacante autorizado ejecute código localmente.

10 Jun 2025, 20:15

Type Values Removed Values Added
CWE CWE-77 CWE-22

10 Jun 2025, 18:15

Type Values Removed Values Added
CWE CWE-77

10 Jun 2025, 17:23

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-10 17:23

Updated : 2025-07-01 16:50


NVD link : CVE-2025-47176

Mitre link : CVE-2025-47176

CVE.ORG link : CVE-2025-47176


JSON object : View

Products Affected

microsoft

  • office_long_term_servicing_channel
  • 365_apps
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')