Description
Improper limitation of a pathname to a restricted directory ('path traversal') in Azure Logic Apps allows an unauthorized attacker to elevate privileges over a network.
Published: 2026-01-22
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

This vulnerability stems from a path traversal flaw that allows an attacker who can supply or influence file paths to bypass directory restrictions. By crafting a malicious path, an unauthorized user can access files outside the intended sandbox, effectively lifting their privileges over the affected network. The security impact is a direct escalation of privileges, potentially granting the attacker unauthorized read, write, or execute access to sensitive resources and data integrity violations.

Affected Systems

Microsoft Azure Logic Apps is the affected product. No specific version range is provided in the CNA data, so all current and future deployments of Azure Logic Apps that have not applied the patch are considered at risk.

Risk and Exploitability

The CVSS score of 8.2 indicates a high severity, while the EPSS score of less than 1% suggests exploitation is currently unlikely but possible. The vulnerability is not listed in the CISA KEV catalog, which may imply limited active exploitation. Based on the description, the likely attack vector is remote, where an attacker sends a crafted request to the Logic Apps service. The absence of an explicit CNA solution in the input indicates that Microsoft has likely released a patch; therefore, the vulnerability can be mitigated by staying updated with the latest Azure patch releases.

Generated by OpenCVE AI on April 16, 2026 at 07:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Azure Logic Apps to the latest patch version that addresses CVE-2026-21227 as published by Microsoft
  • Restrict access to Logic Apps endpoints by configuring network rules so only authenticated and authorized users can send requests
  • Implement monitoring and alerting for unusual path traversal patterns in application logs to detect potential exploitation attempts

Generated by OpenCVE AI on April 16, 2026 at 07:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 03 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:microsoft:azure_logic_apps:-:*:*:*:*:*:*:*

Fri, 23 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Improper limitation of a pathname to a restricted directory ('path traversal') in Azure Logic Apps allows an unauthorized attacker to elevate privileges over a network.
Title Azure Logic Apps Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft azure Logic Apps
Weaknesses CWE-22
CPEs cpe:2.3:a:microsoft:azure_logic_apps:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft azure Logic Apps
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Azure Logic Apps
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-01T13:49:26.311Z

Reserved: 2025-12-11T21:02:05.732Z

Link: CVE-2026-21227

cve-icon Vulnrichment

Updated: 2026-01-23T20:08:17.196Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-22T23:15:57.220

Modified: 2026-02-03T12:50:56.237

Link: CVE-2026-21227

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T07:45:06Z

Weaknesses