CVE-2025-47168
vulnerability analysis and mitigation

Overview

CVE-2025-47168 is a remote code execution vulnerability affecting Microsoft Word that was disclosed on June 10, 2025. The vulnerability is classified as a use-after-free issue that allows an unauthorized attacker to execute code locally on affected systems. The vulnerability specifically impacts Microsoft Word 2016 and related Office products (Wiz, NVD).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with the vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This indicates that the vulnerability requires local access and user interaction to exploit, but can result in high impacts to confidentiality, integrity, and availability. The vulnerability is classified as CWE-416 (Use After Free), which occurs when previously freed memory is accessed (NVD).

Impact

If successfully exploited, this vulnerability allows an unauthorized attacker to execute code locally on the affected system with the privileges of the current user (NVD, Wiz).

Mitigation and workarounds

Microsoft has released security update KB5002710 to address this vulnerability. The update is available through Microsoft Update, Microsoft Update Catalog, and as a standalone package through the Microsoft Download Center. Users of Microsoft Word 2016 should apply the security update immediately (Wiz).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management