CVE-2026-33114 – Microsoft Word Remote Code Execution Vulnerability

CVSS 8.4 IMPORTANT

“A single untrusted pointer can turn a harmless document into a full system takeover—this flaw lets attackers weaponize everyday files.”

This vulnerability in Microsoft Word is caused by an untrusted pointer dereference, allowing an attacker to execute arbitrary code on a local system. Although classified as a local attack, it can be triggered through malicious documents, including via the Preview Pane, making it a serious threat in common user workflows involving document handling.

CVSS Score: 8.4
SEVERITY: Critical
THREAT: Remote Code Execution via untrusted pointer dereference in Microsoft Word

EXPLOITS:
No public exploits or proof-of-concept code are currently known, and the vulnerability has not been publicly disclosed prior to release. Exploitation is considered less likely at this stage.

TECHNICAL SUMMARY:
The vulnerability arises from improper handling of pointers in Microsoft Word. Specifically, the application may dereference a pointer that references untrusted or invalid memory. An attacker can craft a malicious document that manipulates pointer references during processing. When the document is opened or previewed, Word may attempt to access memory locations controlled or influenced by the attacker, leading to memory corruption. This can ultimately allow arbitrary code execution in the context of the user.

EXPLOITABILITY:
Affects Microsoft Word and related Office components.
No authentication required. Exploitation can occur via opening or previewing a specially crafted document.

BUSINESS IMPACT:
This vulnerability is dangerous because it leverages normal user behavior—interacting with documents. Attackers can distribute malicious files through phishing or shared drives, leading to endpoint compromise. The Preview Pane vector increases exposure by reducing the need for user interaction. Successful exploitation can result in data theft, malware deployment, and lateral movement within the organization.

WORKAROUND:
If patching is not immediately possible:

  • Disable the Preview Pane in Windows Explorer
  • Avoid opening files from untrusted sources
  • Use Protected View and endpoint protection controls

URGENCY:
This vulnerability affects a widely used productivity application and can be triggered with minimal user interaction, including through the Preview Pane. The combination of high impact and ease of delivery through phishing campaigns increases the likelihood of exploitation in real-world scenarios, making timely patching critical.

Key Details

Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
CWE Classification
CWE-822
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.