PT-2026-40196 · Microsoft · Office Word+1
Published
2026-05-12
·
Updated
2026-05-12
·
CVE-2026-40361
CVSS v3.1
8.4
High
| Vector | AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Microsoft Office Word (affected versions not specified)
Microsoft Outlook (affected versions not specified)
Description
A use after free issue in the shared library
wwlib.dll allows an unauthorized attacker to execute code locally. In Microsoft Outlook, this can be triggered as a 0-click attack, meaning the issue is activated as soon as a victim reads or previews an email, without requiring the user to click links or attachments. This occurs because the flaw resides in the email rendering engine.Recommendations
As a temporary workaround for Microsoft Outlook, set the application to render emails only in plain text format.
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Use After Free
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Office Word
Outlook