⚠ Actively exploited
Added to CISA KEV on 2026-01-26. Federal agencies required to patch by 2026-02-16. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable..
CVE-2026-21509
Severity
7.8HIGH
EPSS
7.5%
top 8.21%
CISA KEV
KEV
Added 2026-01-26
Due 2026-02-16
Exploit
No known exploits
Affected products
Timeline
PublishedJan 26
KEV addedJan 26
KEV dueFeb 16
Latest updateMar 15
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Description
Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages7 packages
🔴Vulnerability Details
3GHSA▶
GHSA-ch84-h92g-mw93: Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally↗2026-01-26
📋Vendor Advisories
2🕵️Threat Intelligence
6Bleepingcomputer
▶