Feb 2026: Microsoft Word Security Feature Bypass Vulnerability
CVE-2026-21514 Published on February 10, 2026

Microsoft Word Security Feature Bypass Vulnerability
Reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally.

Vendor Advisory NVD

Known Exploited Vulnerability

This Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.

The following remediation steps are recommended / required by March 3, 2026: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weakness Type

Reliance on Untrusted Inputs in a Security Decision

The application uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism.


Products Associated with CVE-2026-21514

Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.

 
 
 
 
 

Affected Versions

Microsoft 365 Apps for Enterprise: Microsoft Office LTSC 2021: Microsoft Office LTSC 2024: Microsoft Office LTSC for Mac 2021: Microsoft Office LTSC for Mac 2024:

Exploit Probability

EPSS
5.14%
Percentile
89.69%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.