What Metadata Is Hidden Inside Office Documents?
When you create or edit a Word document, Excel spreadsheet, or PowerPoint presentation, the application automatically embeds metadata you never explicitly entered. This data lives silently inside the file and travels with it every time you share it. Most people have no idea it exists until they check.
Office Open XML files (DOCX, XLSX, PPTX) are ZIP archives containing XML files. Two of those XML files — docProps/core.xml and docProps/app.xml — store all document properties. This tool reads both and surfaces what's embedded.
The Most Sensitive Fields
Not all metadata is equally revealing. These are the fields that most commonly expose identity or internal information:
Author and Last Modified By
The dc:creator field records the name of the person who created the document — typically pulled from your Windows account or Microsoft 365 profile when you first saved the file. The cp:lastModifiedBy field records whoever last saved it. These are often full names. A contract sent to a counterparty with your full name in the author field is extremely common, and frequently unintentional.
Company and Manager
If your Office installation is registered to an organisation, the company name and sometimes a manager's name are embedded in app.xml. Documents created on corporate machines often reveal the employer name without the author realising it.
Revision Count
Every time you save a document, the revision counter increments. A revision count of 47 tells the recipient that this document went through 47 save cycles — implying significant editing history and multiple drafts. In legal or commercial contexts, this can be sensitive.
Total Editing Time
Microsoft Word and PowerPoint record the cumulative time the document was open for editing in app.xml. A total editing time of 4 hours on a "final" document reveals the effort invested. More concerning: it can be used to infer that a document claiming to be written on a specific day was actually prepared over weeks.
Last Printed
The date and time the document was last printed is stored in core.xml. This can reveal operational details in sensitive contexts — when a document was last reviewed in physical form before a meeting or signing.
Template
The template used to create the document is recorded in app.xml. Template names often include organisation or department identifiers (e.g. "LegalDept-NDA-Template-v3.dotm") that reveal internal naming conventions.
Which File Types Are Supported?
This tool supports the Office Open XML format — the default format for modern Microsoft Office applications:
- DOCX — Word documents (Word 2007 and later)
- XLSX — Excel spreadsheets (Excel 2007 and later)
- PPTX — PowerPoint presentations (PowerPoint 2007 and later)
Older formats (.doc, .xls, .ppt) use a different binary format (OLE Compound Document) and are not supported. Convert them to the modern format first using Microsoft Office, LibreOffice, or Google Docs export.
How to Use the Office Metadata Viewer
- Drop your file — drag a DOCX, XLSX, or PPTX onto the upload area, or click to browse.
- Review the results — fields are grouped into categories: Identity & History (the sensitive ones, marked with a yellow dot), Document, Dates, and Application.
- Take action — if sensitive fields are found, use the Office Metadata Remover to clean the document before sharing.
Privacy and Security
Your files are processed entirely in your browser. The tool reads the ZIP structure of your Office file using JavaScript — no bytes are sent to any server. Closing the tab discards everything.
Related Tools
Other NoFileUpload tools for managing document metadata:
- Office Metadata Remover — clean author, company, revision count, and editing history from DOCX, XLSX, and PPTX files.
- PDF Metadata Viewer — inspect hidden metadata in PDF documents.
- PDF Metadata Remover — strip author and timestamps from PDF files before sharing.