Description
Improper neutralization of special elements used in a command ('command injection') in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Published: 2026-03-19
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch
AI Analysis

Impact

The flaw in Microsoft 365 Copilot is a command injection weakness (CWE‑77) due to improper neutralization of special elements used in a command. An attacker who can send a specially crafted request to the Copilot service can cause the backend to execute unintended commands, which can then read or transmit data that the service normally handles. The result is the disclosure of information that may include proprietary or sensitive data processed by the Copilot service.

Affected Systems

Any deployment of Microsoft 365 Copilot that includes the vulnerable command handling code is affected. Microsoft 365 Enterprise customers using Copilot should treat all versions as vulnerable until they apply the official patch, as the CNA has not provided specific version ranges.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, meaning no confirmed exploits are known. The likely attack vector is a network‑based attack in which an adversary gains access to the Copilot endpoint, possibly via a compromised user session or a mis‑configured network perimeter. Once the command injection is triggered, the attacker can exfiltrate information, potentially impacting confidentiality on the affected deployment. Given the medium score but low EPSS, the risk remains moderate, but organizations should treat the issue as a potential threat until a patch is applied.

Generated by OpenCVE AI on March 24, 2026 at 19:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Microsoft security update for CVE‑2026‑24299 through the Microsoft Security Response Center update guide as soon as it is released.
  • If a patch is not yet available, restrict network traffic to the Copilot service by configuring firewalls or IAM policies to allow only trusted sources to communicate with the endpoint.
  • Verify that the update has been installed by checking the update status in the Microsoft 365 admin center or querying the Microsoft Graph API for the installed update list.

Generated by OpenCVE AI on March 24, 2026 at 19:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:microsoft:365_copilot:-:*:*:*:*:*:*:*

Mon, 23 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Description Improper neutralization of special elements used in a command ('command injection') in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Title M365 Copilot Information Disclosure Vulnerability
First Time appeared Microsoft
Microsoft 365 Copilot
Weaknesses CWE-77
CPEs cpe:2.3:a:microsoft:365_copilot:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft 365 Copilot
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C'}


Subscriptions

Microsoft 365 Copilot
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-09T23:26:00.481Z

Reserved: 2026-01-21T21:28:02.969Z

Link: CVE-2026-24299

cve-icon Vulnrichment

Updated: 2026-03-20T20:18:39.401Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T21:17:00.077

Modified: 2026-03-24T17:19:45.103

Link: CVE-2026-24299

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:54:49Z

Weaknesses