CVE-2025-14714

6.5 MEDIUM

📋 TL;DR

This CVE describes an authentication bypass vulnerability in LibreOffice on macOS where the bundled Python interpreter inherits the main application's TCC permissions. Attackers can execute scripts directly through the interpreter to bypass macOS privacy controls. This affects LibreOffice users on macOS versions 25.2 through 25.2.3.

💻 Affected Systems

Products:
  • LibreOffice
Versions: from 25.2 before 25.2.4
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS due to TCC framework; requires LibreOffice to have been granted TCC permissions by the user.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to sensitive macOS-protected resources like camera, microphone, contacts, or files without user consent, potentially leading to data exfiltration or surveillance.

🟠

Likely Case

Local attackers with user-level access can bypass macOS privacy controls to access protected resources that LibreOffice has permission to use.

🟢

If Mitigated

With proper controls, only the main LibreOffice application can launch the interpreter with TCC permissions, preventing unauthorized script execution.

🌐 Internet-Facing: LOW - This requires local access to the system; not directly exploitable over the network.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this to bypass macOS privacy controls on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access to the system and ability to execute scripts through the bundled Python interpreter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.2.4

Vendor Advisory: https://www.libreoffice.org/about-us/security/advisories/cve-2025-14714

Restart Required: Yes

Instructions:

1. Open LibreOffice. 2. Go to Help > Check for Updates. 3. Follow prompts to update to version 25.2.4 or later. 4. Restart LibreOffice after update completes.

🔧 Temporary Workarounds

Remove LibreOffice TCC permissions

macOS

Revoke LibreOffice's TCC permissions in System Settings to prevent exploitation

1. Open System Settings > Privacy & Security
2. Select relevant categories (Camera, Microphone, Files, etc.)
3. Remove LibreOffice from allowed applications

Disable Python interpreter execution

macOS

Prevent execution of the bundled Python interpreter

chmod -x /Applications/LibreOffice.app/Contents/Resources/python

🧯 If You Can't Patch

  • Restrict user access to systems running vulnerable LibreOffice versions
  • Monitor for unusual Python interpreter execution from LibreOffice directories

🔍 How to Verify

Check if Vulnerable:

Check LibreOffice version via About LibreOffice dialog or terminal command

Check Version:

/Applications/LibreOffice.app/Contents/MacOS/soffice --version

Verify Fix Applied:

Confirm version is 25.2.4 or later and check that parent-constraints are properly implemented

📡 Detection & Monitoring

Log Indicators:

  • Python interpreter execution from LibreOffice directories without parent process being LibreOffice
  • Unauthorized access attempts to TCC-protected resources

Network Indicators:

  • Unusual outbound connections from LibreOffice Python processes

SIEM Query:

process.name:python AND process.path:/Applications/LibreOffice.app/* AND NOT parent.process.name:soffice

🔗 References

📤 Share & Export