CVE-2026-21514 – Microsoft Word Security Feature Bypass Vulnerability

CVSS 7.8 IMPORTANT

“A malicious document can quietly bypass Word’s built-in defenses and open the door to full system compromise.”

CVE-2026-21514 is an important-severity security feature bypass vulnerability in Microsoft Word. The issue is caused by reliance on untrusted inputs during security decisions, allowing an attacker to bypass OLE protection mechanisms. By convincing a user to open a specially crafted Word document, attackers can defeat safeguards designed to block dangerous COM and OLE content. Microsoft has confirmed that this vulnerability has been publicly disclosed and actively exploited.

CVSS Score: 7.8 SEVERITY: Important THREAT: Security Feature Bypass

EXPLOITS: The vulnerability has been publicly disclosed and is actively exploited in the wild. Functional exploit code exists, demonstrating reliable bypass of Word’s OLE mitigation protections through crafted documents delivered via social engineering.

TECHNICAL SUMMARY: The flaw occurs when Microsoft Word relies on untrusted input while making security decisions related to embedded OLE and COM objects. This improper trust model allows malicious document metadata or object data to influence execution paths that should be restricted. As a result, Word may incorrectly treat unsafe embedded content as trusted, bypassing security mitigations meant to prevent exploitation of vulnerable controls. Once bypassed, attackers can trigger follow-on actions that compromise confidentiality, integrity, and availability.

EXPLOITABILITY: This vulnerability affects supported versions of Microsoft Word, including Microsoft 365 Apps and Microsoft Office installations where OLE protections are enforced. Exploitation requires no privileges but does require user interaction — the victim must open a malicious document. The Preview Pane is not an attack vector.

BUSINESS IMPACT: Because Microsoft Word is widely used and heavily targeted, this vulnerability presents a significant risk to organizations. Successful exploitation can lead to malware execution, credential theft, data exfiltration, and persistent access. Security feature bypass vulnerabilities are especially dangerous because they undermine user trust in built-in protections and increase phishing campaign success rates.

WORKAROUND: If patching cannot be applied immediately, organizations should strengthen email filtering, block untrusted Office attachments, and enforce protected document handling policies. User awareness and reduced exposure to external documents can help lower risk temporarily.

URGENCY: This vulnerability requires immediate remediation due to confirmed active exploitation, public disclosure, and the availability of functional exploit techniques. Delayed patching significantly increases exposure to phishing-based compromise campaigns.

Key Details

Affected Product
Microsoft 365 Apps
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
CWE Classification
CWE-807
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.