Description

A critical security vulnerability (CVE-2025-0514) in LibreOffice has been patched following its discovery that attackers could exploit the hyperlink handling mechanism to execute malicious files on Windows systems. The flaw, affecting versions before 24.8.5, arises from improper validation of non-file URLs interpreted as Windows file paths via the ShellExecute function. This vulnerability allows specially crafted URLs to bypass safeguards and execute arbitrary code when users click on hyperlinks in documents (e.g., .odt, .ods), even without macros enabled. The issue is triggered by LibreOffice’s hyperlink activation feature (CTRL+click), which normally blocks paths to executable files. However, certain URI schemes or encoding methods could evade these restrictions. LibreOffice released version 24.8.5 on February 25, 2025, to address the issue by introducing enhanced validation checks to prevent non-file URLs from being interpreted as local file paths. The fix was developed by Caolán McNamara from Collabora Productivity and Stephen Bergman from allotropia, with security researcher Amel Bouziane-Leblond discovering and reporting the vulnerability. Although there have been no confirmed exploitations, the flaw poses a significant risk, as attackers could distribute malicious documents via phishing campaigns. Users are urged to update to the latest version immediately and avoid interacting with untrusted hyperlinks. Administrators are advised to enforce update policies and educate users on potential social engineering threats. While this vulnerability primarily affects Windows users, it underscores the ongoing security challenges in document processing workflows. Users can download the patch from LibreOffice’s official repository or through Linux distribution maintainers.