Home Microsoft CVE-2025-29822
Back to Microsoft

CVE-2025-29822

Microsoft Office OneNote

Microsoft CVSS 7.8 Updated March 12, 2026

Executive Risk Summary

"An unauthorized attacker can bypass a security feature locally in Microsoft Office OneNote due to an incomplete list of disallowed inputs, potentially allowing for malicious activity. This vulnerability could be exploited to gain unauthorized access to sensitive information or disrupt the normal functioning of the application."

Operational Audit Arsenal

Target Type Executable
Target Asset onenote.exe
Standard Path %programfiles%Microsoft OfficeRootOffice16onenote.exe
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: onenote.exe (Executable)
$Targets = 'onenote.exe'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

Microsoft Office OneNote service affected

Internal Work Notes

CVE-2025-29822: Microsoft Office OneNote security bypass vulnerability, requires patching to prevent unauthorized access

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Microsoft Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.