CVE-2025-64677

8.2 HIGH

📋 TL;DR

This cross-site scripting (XSS) vulnerability in Microsoft Office Out-of-Box Experience allows attackers to inject malicious scripts into web pages. When exploited, it enables spoofing attacks where users see manipulated content. This affects users running vulnerable versions of Microsoft Office.

💻 Affected Systems

Products:
  • Microsoft Office
Versions: Specific versions not yet detailed in public advisory
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Office Out-of-Box Experience components during initial setup or configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal user credentials, session cookies, or redirect users to malicious sites by injecting scripts that appear legitimate.

🟠

Likely Case

Attackers perform spoofing attacks to trick users into revealing sensitive information or clicking malicious links.

🟢

If Mitigated

With proper input validation and output encoding, the attack surface is minimized, though the vulnerability still exists until patched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific versions

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64677

Restart Required: Yes

Instructions:

1. Open Microsoft Office application. 2. Go to File > Account > Update Options > Update Now. 3. Restart Office applications after update completes.

🔧 Temporary Workarounds

Disable Office Out-of-Box Experience

windows

Prevents the vulnerable component from loading during Office startup

reg add "HKCU\Software\Microsoft\Office\16.0\Common\General" /v "ShownFirstRunOptin" /t REG_DWORD /d 1 /f

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads
  • Use browser security settings to restrict script execution in Office web components

🔍 How to Verify

Check if Vulnerable:

Check Office version against patched versions in Microsoft Security Update Guide

Check Version:

In Word/Excel: File > Account > About [Application Name]

Verify Fix Applied:

Verify Office version is updated to patched version and test XSS payloads no longer execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual Office startup activities
  • Suspicious script execution in Office processes

Network Indicators:

  • Unexpected network calls from Office applications to external domains

SIEM Query:

OfficeProcess AND (CommandLine CONTAINS "script" OR NetworkDestination CONTAINS suspicious_domain)

🔗 References

📤 Share & Export