Hackers have long used Word and Excel documents as delivery vehicles for malware, and in 2025, these tricks are far from outdated. From phishing schemes to zero-click exploits, malicious Office files are still one of the easiest ways into a victim’s system.
Here are the top three Microsoft Office-based exploits still making the rounds this year and what you need to know to avoid them.
1.
Discover how dynamic benchmarking and CTF exercises can strengthen your security team in our Masterclass webinar, From Theory to Action. Stay ahead of evolving cyber threats!
A vulnerability was found in Post Grid Gutenberg Blocks and Blog Plugin up to 4.1.1 on WordPress. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-5223. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Login Logout Register Menu Plugin up to 2.0 on WordPress. It has been declared as problematic. This vulnerability affects the function llrmloginlogout of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-3726. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Testimonial Carousel for Elementor Plugin up to 10.2.1 on WordPress. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-2253. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Mitel MiContact Center Business up to 10.0.0.4. This affects an unknown part of the component Ignite. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-35283. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as problematic has been found in WP To Do Plugin up to 1.3.0 on WordPress. This affects the function wptodo_addcomment. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2024-3943. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Unlimited Elements for Elementor Plugin up to 1.5.107 on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Text Field Handler. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-3190. The attack may be launched remotely. There is no exploit available.