CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2026-21514
7.81.95%

Trust Issues: The Art of lying to Microsoft Word (CVE-2026-21514)

Amit Schendel
Amit Schendel
Senior Security Researcher

Feb 18, 2026·7 min read·6 visits

Active ExploitationCISA KEV Listed

Executive Summary (TL;DR)

Active zero-day in Microsoft Word allowing RCE via OLE objects. By modifying document properties, attackers bypass security prompts and MotW. Microsoft patched this in Feb 2026. If unpatched, opening a document triggers immediate payload execution.

In the world of binary exploitation, legacy code is the gift that keeps on giving. CVE-2026-21514 is a prime example of 'tech debt' meeting 'logical fallacy.' This high-severity zero-day vulnerability in Microsoft Word allows attackers to bypass critical Object Linking and Embedding (OLE) security mitigations—essentially the digital equivalent of a 'Beware of Dog' sign that gets taken down by the burglar. By manipulating the internal XML structure of a document, an attacker can convince Word that a malicious OLE object is trustworthy, bypassing Mark-of-the-Web (MotW) protections and executing code without the user ever seeing a confirmation prompt.

The Hook: The Ghost of Office 97

If you've been in the security game long enough, the acronym 'OLE' (Object Linking and Embedding) should send a shiver down your spine. Originally designed in the ancient times (the 1990s) to let you embed an Excel spreadsheet inside a Word doc for that sweet, sweet corporate synergy, it has evolved into one of the most reliable attack surfaces in Windows history. Why? Because OLE is complex, it involves inter-process communication, and it was built in an era where 'security' meant locking your office door.

CVE-2026-21514 isn't a buffer overflow. It's not a use-after-free deep in the heap allocator. It's something far more embarrassing for Redmond: a logic flaw in how trust is established. Modern versions of Office have layers of defenses—Protected View, Mark-of-the-Web (MotW), and scary yellow bars that ask, 'Do you really want to enable content?' These are the gatekeepers.

This vulnerability is the digital equivalent of walking up to a bouncer, handing him a napkin that says 'I am on the VIP list' in crayon, and having him step aside. The flaw lies in the fact that winword.exe relies on untrusted input—the document itself—to decide whether to enforce security checks. It's a classic case of the inmate running the asylum.

The Flaw: Asking the Burglar if He's a Cop

The vulnerability, formally identified as CWE-807: Reliance on Untrusted Inputs in a Security Decision, stems from how Word parses the Office Open XML (OOXML) format. When you open a .docx file, you aren't opening a document; you are opening a zip archive filled with XML files. One of these files (typically word/settings.xml or specific relationship files) dictates how the document behaves.

Under normal circumstances, if a document contains an OLE object (like an embedded script or executable), Word checks the file's origin. If it has the MotW (downloaded from the internet), Word locks it down. It throws the user into Protected View and disables OLE execution until the user explicitly clicks 'Enable Content.'

However, the developers added a 'fast path' or a compatibility flag—likely intended for trusted enterprise templates or specific legacy workflows. By injecting a specific property into the XML configuration, an attacker can trick the parsing logic. The code essentially says: if (document.says_it_is_safe) { skip_security_checks(); }. The flaw is that the attacker controls the document. They can simply flip the bit that says 'I am safe,' and Word obliges, bypassing the MotW checks entirely.

The Code: Anatomy of a Lie

Let's look at what's actually happening inside the OOXML structure. While the proprietary source code of winword.exe isn't public, we can infer the logic from the patch and the exploit structure. The vulnerability resides in the handling of OLE object relationships.

In a standard malicious document, an OLE object is defined in word/_rels/document.xml.rels. When Word parses this, it usually flags the TargetMode="External" or specific ProgIDs as dangerous.

The Vulnerable Logic (Conceptual):

// Pseudocode of the vulnerable parsing logic
bool IsSafeToExecute(OLEObject obj, Document doc) {
    if (doc.HasMarkOfTheWeb()) {
        // Check internal setting
        if (doc.Settings.GetProperty("forceTrustOLE") == true) {
             return true; // <--- THE BUG. Trusting the file over the OS.
        }
        return false; // Show Prompt
    }
    return true;
}

The Malicious XML:

To exploit this, an attacker unzips the .docx, navigates to word/settings.xml, and injects a specific override. It looks something like this (simplified for clarity):

<w:settings xmlns:w="http://schemas.openxmlformats.org/wordprocessingml/2006/main">
  <!-- Standard settings -->
  <w:zoom w:percent="100"/>
  <!-- The Poison Pill: Telling Word to ignore OLE warnings -->
  <w:oleLinkProtection w:enforcement="0" />
  <w:objectEmbedProtection w:enforcement="0" />
</w:settings>

By creating a discrepancy between the file's actual origin (Internet) and its internal declaration of security stance, the attacker creates a race condition in the user's brain: the document opens, no yellow bar appears, and the payload executes before the user realizes something is wrong.

The Exploit: From Email to Shell

The exploitation chain for CVE-2026-21514 is elegant in its simplicity. It requires no memory grooming, no ROP chains, and no heap spraying. It is a logic exploit, which makes it extremely stable and 100% reliable across affected versions.

Phase 1: Weaponization

  1. The attacker creates a standard Word document.
  2. They embed a malicious OLE object. This could be a link to a remote .hta file, a Visual Basic script, or a specific COM object invocation.
  3. They save the document as a .docx (OOXML).
  4. They unzip the document and modify word/settings.xml to include the bypass flags identified in the research.
  5. They re-zip the directory structure into a .docx file.

Phase 2: Delivery & Execution

The attacker sends this file via a phishing campaign. The email context usually creates urgency (INVOICE_OVERDUE.docx).

When the victim double-clicks the file:

  1. Word launches.
  2. It detects the MotW, starting to prepare the sandbox.
  3. It parses settings.xml, sees the 'Trust' flag, and aborts the sandbox initialization.
  4. The OLE object activates. If it's a linked object, Word reaches out to the attacker's server, fetches the payload, and executes it.

> [!CRITICAL] > This execution happens silently. Unlike macros, which almost always require a button press in modern Windows environments, this OLE bypass subverts the prompt itself. The user sees the document content; the attacker sees a new callback on their C2 server.

The Impact: Why This Matters

This is not just another CVE. In the current landscape, initial access brokers (IABs) are desperate for reliable execution methods. Microsoft has spent the last five years effectively killing VBA macros (blocking them by default from the internet). This forced attackers to move to OneNote, then MSIX, and now, they are circling back to Word zero-days.

Consequences:

  • RCE: Immediate Remote Code Execution with the privileges of the logged-in user.
  • Bypass Security Training: Users are trained to 'not click the yellow bar.' They are not trained to handle a document that simply opens and hacks them.
  • Ransomware Entry: Groups like LockBit (or their successors) use vulnerabilities like this to gain the initial foothold before lateral movement.

Since this vulnerability was exploited in the wild before the fix, we know it works. The fact that it bypasses the specific mitigation (MotW) designed to stop it makes it a 'Category 1' threat for any organization relying on Office.

The Mitigation: Closing the Window

The obvious fix is to install the February 2026 Patch Tuesday updates immediately. Microsoft has modified winword.exe to ignore these specific XML flags when the Mark-of-the-Web is present. They effectively removed the 'bouncer's bribe' mechanism.

However, if you want to sleep at night, patching isn't enough. You need defense-in-depth.

1. Attack Surface Reduction (ASR) Rules This is your strongest defense against Office-based malware. Enable the following ASR rules in Microsoft Defender:

  • Block all Office applications from creating child processes (GUID: D4F940AB-401B-4EFC-AADC-AD5F3C50688A)
  • Block Office applications from creating executable content (GUID: 3B576869-A4EC-4529-8536-B80A7769E899)

These rules prevent the OLE object from spawning cmd.exe or powershell.exe, killing the kill chain even if the exploit fires.

2. Group Policy Hardening If your users don't legitimately need to embed Excel sheets in Word docs (spoiler: they usually don't), turn it off.

  • Policy: User Configuration -> Admin Templates -> Microsoft Word 2016 -> Word Options -> Security -> Trust Center -> Block all OLE objects.

Do not rely on the user to make the right decision. Make the decision for them.

Official Patches

MicrosoftOfficial Security Update Guide for CVE-2026-21514

Technical Appendix

CVSS Score
7.8/ 10
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Probability
1.95%
Top 17% most exploited

Affected Systems

Microsoft 365 Apps for EnterpriseMicrosoft Office LTSC 2021Microsoft Office LTSC 2024Microsoft Office LTSC for Mac 2021

Affected Versions Detail

Product
Affected Versions
Fixed Version
Microsoft 365 Apps for Enterprise
Microsoft
All versions < Feb 2026 Update16.0.17x
Office LTSC for Mac 2021
Microsoft
< 16.106.2602082116.106.26020821
AttributeDetail
Vulnerability TypeSecurity Feature Bypass (OLE)
CWE IDCWE-807
CVSS Score7.8 (High)
Attack VectorLocal (User Interaction Required)
Exploit StatusActive / Functional
EPSS Score1.95%
KEV ListedYes

MITRE ATT&CK Mapping

T1553.005Subvert Trust Controls: Mark-of-the-Web Bypass
Defense Evasion
T1204.002User Execution: Malicious File
Execution
T1211Exploitation for Client Execution
Execution
CWE-807
Reliance on Untrusted Inputs in a Security Decision

Reliance on Untrusted Inputs in a Security Decision

Known Exploits & Detection

Private/Threat ActorFunctional exploit used in wild against enterprise targets.
TheoreticalOOXML structure manipulation via 'settings.xml' modification.
NucleiDetection Template Available

Vulnerability Timeline

Zero-day exploitation detected in the wild by Mandiant
2026-01-30
Microsoft publishes CVE-2026-21514 and releases patches
2026-02-10
Added to CISA Known Exploited Vulnerabilities (KEV) list
2026-02-10
Detailed analysis by CrowdStrike confirming OLE bypass
2026-02-17

References & Sources

  • [1]Microsoft Security Response Center
  • [2]CISA KEV Catalog
Related Vulnerabilities
CVE-2023-36884CVE-2021-40444

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.