Home

Description

An Authentication Bypass vulnerability existed where the application bundled an interpreter (Python) that inherits the Transparency, Consent, and Control (TCC) permissions granted by the user to the main application bundle By executing the bundled interpreter directly the attacker's scripts run with the application's TCC privileges In fixed versions parent-constraints are used to allow only the main application to launch interpreter with those permissions This issue affects LibreOffice on macOS: from 25.2 before < 25.2.4.

PUBLISHED Reserved 2025-12-15 | Published 2025-12-15 | Updated 2025-12-15 | Assigner Document Fdn.




LOW: 0.9CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:U

Problem types

CWE-288 Authentication Bypass Using an Alternate Path or Channel

Product status

Default status
unknown

25.2 (25.2 series) before < 25.2.4
affected

Credits

Karol Mazurek of AFINE finder

References

www.libreoffice.org/...us/security/advisories/cve-2025-14714

cve.org (CVE-2025-14714)

nvd.nist.gov (CVE-2025-14714)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.