Headline
CVE-2025-32717: Microsoft Word Remote Code Execution Vulnerability
How could an attacker exploit this vulnerability?
An unauthenticated attacker could exploit this vulnerability by crafting a malicious RTF file. If a user opens the file or it is rendered in the preview pane, the attacker could execute arbitrary code in the user’s context.