Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-21509— Microsoft Office Security Feature Bypass Vulnerability

CVSS 7.8 · High KEV EPSS 12.53% · P94
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-21509

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Microsoft Office Security Feature Bypass Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
在安全决策中依赖未经信任的输入
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Office 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Office是美国微软(Microsoft)公司的一款办公软件套件产品。该产品常用组件包括Word、Excel、Access、Powerpoint、FrontPage等。 Microsoft Office存在安全漏洞,该漏洞源于安全决策依赖不可信输入,可能导致本地攻击者绕过安全功能。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftMicrosoft 365 Apps for Enterprise 16.0.1 ~ https://aka.ms/OfficeSecurityReleases -
MicrosoftMicrosoft Office 2016 16.0.0 ~ 16.0.5539.1001 -
MicrosoftMicrosoft Office 2019 19.0.0 ~ 16.0.10417.20095 -
MicrosoftMicrosoft Office LTSC 2021 16.0.1 ~ https://aka.ms/OfficeSecurityReleases -
MicrosoftMicrosoft Office LTSC 2024 16.0.0 ~ https://aka.ms/OfficeSecurityReleases -

II. Public POCs for CVE-2026-21509

#POC DescriptionSource LinkShenlong Link
1CVE-2026-21509https://github.com/kimstars/Ashwesker-CVE-2026-21509POC Details
2Educational PoC for CVE‑2026‑21509 (Microsoft Office security feature bypass). Generates a harmless DOCX with dummy OLE artifacts to study EDR/AV visibility. Not an exploit. For isolated labs only; see README for 7‑Zip inspection steps and mitigation references.https://github.com/gavz/CVE-2026-21509-PoCPOC Details
3Powershell script with Detection and Remediation for CVE-2026-21509https://github.com/ksk-itdk/KSK-ITDK-CVE-2026-21509-MitigationPOC Details
4New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026-21509**, targeting the Windows Network File System (NFSv4.1) kernel-mode driver (`nfssvr.sys`). https://github.com/SimoesCTT/CTT-NFS-Vortex-RCEPOC Details
5Microsoft just released emergency patches for CVE-2026-21509, a zero-day in the Office Suite that bypasses OLE/COM mitigations when a user simply opens a file. They think their "Service-side change" for Office 2021+ is a solid wall. https://github.com/SimoesCTT/SCTT-2026-33-0007-The-OLE-Vortex-Laminar-Bypass-POC Details
6CVE-2026-21509 is a critical bypass in the Microsoft Office OLE (Object Linking and Embedding) validation engine. While standard "laminar" exploits attempt to manipulate static COM objects, this repository utilizes Theorem 4.2 to achieve a speculative race-condition bypass of the Object Definition Rule (ODR).https://github.com/SimoesCTT/CTT-MICROSOFT-OFFICE-OLE-MANIFOLD-BYPASS-CVE-2026-21509POC Details
7YARA rule and python script to detect potential exploits for the CVE-2026-21509 vulnerability in MS Officehttps://github.com/decalage2/detect_CVE-2026-21509POC Details
8Nonehttps://github.com/kaizensecurity/CVE-2026-21509POC Details
9CVE-2026-21509 Mitigationhttps://github.com/planetoid/cve-2026-21509-mitigationPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-21509

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-21509

No comments yet


Leave a comment