Description
Improper authorization in Microsoft Power Apps allows an authorized attacker to execute code over a network.
Published: 2026-01-16
Score: 8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Assess Impact
AI Analysis

Impact

Microsoft Power Apps Desktop Client has an issue where an authorized user can gain authorization privileges that allow the execution of arbitrary code across a network. The flaw is an improper authorization weakness that enables a malicious actor who already has authenticated access to the application to bypass normal privilege checks and run code with elevated rights, potentially compromising data confidentiality, system integrity, and availability. The weakness is specifically mapped to improper authorization and insufficient permission checks.

Affected Systems

All Windows installations of Microsoft Power Apps Desktop Client are affected. Exact version numbers are not disclosed in the advisory, so any deployment of the desktop client should be examined for the presence of the vulnerability.

Risk and Exploitability

The CVSS score of 8.0 indicates high severity, but the EPSS score is below 1%, suggesting that the likelihood of exploitation by attackers at this time is very low. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack vector appears to be remote over a network, requiring an attacker to already be authenticated to the application. Exploitation would involve leveraging successful authorization bypass to spawn or execute code on the target system, potentially enabling a full compromise of the user’s environment.

Generated by OpenCVE AI on April 16, 2026 at 18:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available Microsoft Power Apps Desktop Client update or patch that addresses the authorization flaw.
  • Restrict network access to the application by configuring firewall or network segmentation rules to limit the paths an attacker could use to deploy code remotely.
  • Enforce the principle of least privilege for all users of Power Apps, ensuring that only the necessary permissions are granted and monitoring for any privilege escalation activity.

Generated by OpenCVE AI on April 16, 2026 at 18:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft power Apps
Weaknesses CWE-863
CPEs cpe:2.3:a:microsoft:power_apps:*:*:*:*:*:windows:*:*
Vendors & Products Microsoft power Apps

Thu, 29 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Title Microsoft Power Apps Remote Code Execution Vulnerability PowerApps Desktop Client Remote Code Execution Vulnerability
First Time appeared Microsoft power Apps Desktop Client
CPEs cpe:2.3:a:microsoft:power-apps:*:*:*:*:*:*:*:* cpe:2.3:a:microsoft:power_apps_desktop_client:*:*:*:*:*:*:*:*
Vendors & Products Microsoft power-apps
Microsoft power Apps Desktop Client

Fri, 16 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 16 Jan 2026 21:45:00 +0000

Type Values Removed Values Added
Description Improper authorization in Microsoft Power Apps allows an authorized attacker to execute code over a network.
Title Microsoft Power Apps Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft power-apps
Weaknesses CWE-285
CPEs cpe:2.3:a:microsoft:power-apps:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft power-apps
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Power Apps Power Apps Desktop Client
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-01T13:49:02.368Z

Reserved: 2025-12-04T20:04:16.340Z

Link: CVE-2026-20960

cve-icon Vulnrichment

Updated: 2026-01-16T21:49:26.640Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-16T22:16:25.553

Modified: 2026-02-12T18:37:37.203

Link: CVE-2026-20960

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T18:15:43Z

Weaknesses