Skip to main content
Security 2 min read 335 views

Critical Microsoft Office RCE Vulnerabilities CVE-2026-26113 and CVE-2026-26110 Demand Urgent Patching

Two critical remote code execution vulnerabilities in Microsoft Office — CVE-2026-26113 and CVE-2026-26110 — allow attackers to execute malicious code through specially crafted documents, with security analysts warning that exploitation is likely imminent given the widespread use of Office in enterprise environments.

TD

TechDrop Editorial

Share:

Security analysts are urging organizations to prioritize patching two critical remote code execution vulnerabilities in Microsoft Office — CVE-2026-26113 and CVE-2026-26110 — disclosed in the March 2026 Patch Tuesday release. Both flaws allow attackers to execute malicious code through specially crafted Office documents, with the preview pane serving as an attack vector.

Preview Pane Exploitation

The most concerning aspect of both vulnerabilities is that the preview pane in Windows File Explorer and Outlook is listed as an attack vector. This means that a user does not need to explicitly open a malicious document to trigger the vulnerability — simply navigating to a folder containing a malicious file or receiving it as an email attachment and viewing the preview could be sufficient. This attack vector significantly increases the risk because it removes the "don't open suspicious files" defense that organizations rely on as a first line of protection.

Exploitation Likelihood

Microsoft rates CVE-2026-26113 as "Exploitation More Likely" based on the vulnerability characteristics and the availability of technical details that could enable exploit development. CVE-2026-26110 is rated as "Exploitation Less Likely" with no confirmed proof-of-concept exploit, but security researchers note that Office vulnerabilities historically attract rapid exploit development given the ubiquity of Microsoft Office in enterprise environments.

Remediation Priority

Organizations should apply the March 2026 Office updates as their highest priority after the SQL Server zero-day. For environments where immediate patching is not possible, temporary mitigations include disabling the preview pane in File Explorer and Outlook, blocking Office file types at the email gateway, and using Application Guard for Office to open untrusted documents in isolated containers. These mitigations reduce but do not eliminate the risk, and should be treated as temporary measures while patch deployment is completed.

Related Articles