The Free and Open Productivity Suite
Released: Apache OpenOffice 4.1.15


Apache OpenOffice Advisory

CVE-2019-9853 Insufficient URL decoding flaw in categorizing macro location

Fixed in Apache OpenOffice 4.1.7


OpenOffice documents can contain macros. The execution of those macros is controlled by the document security settings, typically execution of macros are blocked by default. A URL decoding flaw existed in how the URLs to the macros within the document were processed and categorized, resulting in the possibility to construct a document where macro execution bypassed the security settings. The documents were correctly detected as containing macros, and prompted the user to their existence within the documents, but macros within the document were subsequently not controlled by the security settings allowing arbitrary macro execution. This issue affects: OpenOffice 4.1.6 and older versions.

Severity: Medium

There are no known exploits of this vulnerability.
A proof-of-concept demonstration exists.

Thanks to the reporter for discovering this issue.

Vendor: The Apache Software Foundation

Versions Affected

All Apache OpenOffice versions 4.1.6 and older are affected. versions may also be affected.


Install Apache OpenOffice 4.1.7 for the latest maintenance and cumulative security fixes. Use the Apache OpenOffice download page .


The Apache OpenOffice Security Team would like to thank Nils Emmerich (ERNW Research GmbH) for reporting the issue.

Further Information

For additional information and assistance, consult the Apache OpenOffice Community Forums or make requests to the public mailing list.

The latest information on Apache OpenOffice security bulletins can be found at the Bulletin Archive page .

Security Home -> Bulletin -> CVE-2019-9853

Apache Software Foundation

Copyright & License | Privacy | Contact Us | Donate | Thanks

Apache, OpenOffice, and the seagull logo are registered trademarks of The Apache Software Foundation. The Apache feather logo is a trademark of The Apache Software Foundation. Other names appearing on the site may be trademarks of their respective owners.