CVE-2025-47171
描述: Improper input validation in Microsoft Office Outlook allows an authorized attacker to execute code locally.
Description
Titles: Microsoft Outlook Remote Code Execution Vulnerability - RCE
CVE-2025-47171
Description
This proof-of-concept (PoC) demonstrates the CVE-2025-47171 vulnerability simulation. It injects a crafted mail item into Outlook containing a malicious sync path that triggers an action during scanning.
IMPORTANT:
This PoC simulates the vulnerable Outlook path parsing and triggers a creation of a text file on the user’s Desktop when the malicious path is detected.
Usage
- Ensure you have Outlook installed and configured on your Windows machine.
- Run the PoC script with Python 3.x (requires
pywin32
package):1
2pip install pywin32
python CVE-2025-47171.py - The script will:
- Inject a mail item with the malicious sync path.
- Wait 10 seconds for Outlook to process the mail.
- Scan Inbox and Drafts folders.
- Upon detection, normalize the path and trigger a system restart (
creation of a text file on the user's Desktop
).
Warning
- This script will create a text file on the user’s Desktop after 5 seconds once the payload is triggered.
- Save all work before running.
- Test only in a controlled or virtualized environment.
- Do NOT run on production or important systems.
Files
CVE-2025-47171.py
- The Python proof-of-concept script.README.md
- This file.
License
This PoC is provided for educational and research purposes only.
Use responsibly and ethically.
For Vulnerability databases providers!
- Kind Regards.
Video:
Source:
Time spent:
01:35:00
CVE-2025-47171
http://example.com/2025/07/14/other_988749262/