Impact
An attacker who can interact with the Business Chat feature may send specially crafted messages that bypass the platform’s output sanitization, enabling the downstream component to expose sensitive data to the attacker. The flaw is an injection issue—improper neutralization of special elements during output rendering. If exploited, confidential information or system data could be exposed across the network, potentially allowing disclosure of business communications or internal state.
Affected Systems
Microsoft 365 Copilot Business Chat. No specific version range is provided in the advisory, but all deployments of the component are vulnerable until a vendor‑supplied fix is applied.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity. EPSS is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting no widespread active exploitation is reported yet. The likely attack vector is remote via the network: an unauthorized user can send malicious input to the chat interface and receive disallowed data in return. Because the flaw allows data disclosure without requiring privileged access or additional local exploits, the risk remains significant for any system that processes untrusted chat content.
OpenCVE Enrichment