Description
Improper neutralization of special elements in output used by a downstream component ('injection') in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Published: 2026-05-07
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An attacker who can interact with the Business Chat feature may send specially crafted messages that bypass the platform’s output sanitization, enabling the downstream component to expose sensitive data to the attacker. The flaw is an injection issue—improper neutralization of special elements during output rendering. If exploited, confidential information or system data could be exposed across the network, potentially allowing disclosure of business communications or internal state.

Affected Systems

Microsoft 365 Copilot Business Chat. No specific version range is provided in the advisory, but all deployments of the component are vulnerable until a vendor‑supplied fix is applied.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity. EPSS is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting no widespread active exploitation is reported yet. The likely attack vector is remote via the network: an unauthorized user can send malicious input to the chat interface and receive disallowed data in return. Because the flaw allows data disclosure without requiring privileged access or additional local exploits, the risk remains significant for any system that processes untrusted chat content.

Generated by OpenCVE AI on May 7, 2026 at 22:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Microsoft 365 Copilot to the latest release that contains the security fix for the Business Chat component
  • Re‑enable or confirm output sanitization settings for the chat feature to ensure special elements are neutralized
  • Configure network monitoring and logging to detect anomalous outbound traffic originating from the chat component

Generated by OpenCVE AI on May 7, 2026 at 22:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 21:30:00 +0000

Type Values Removed Values Added
Description Improper neutralization of special elements in output used by a downstream component ('injection') in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Title M365 Copilot Information Disclosure Vulnerability
First Time appeared Microsoft
Microsoft 365 Copilot Business Chat
Weaknesses CWE-74
CPEs cpe:2.3:a:microsoft:365_copilot_business_chat:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft 365 Copilot Business Chat
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C'}


Subscriptions

Microsoft 365 Copilot Business Chat
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-05-07T20:58:09.538Z

Reserved: 2026-02-11T18:33:57.776Z

Link: CVE-2026-26164

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-07T22:16:33.773

Modified: 2026-05-07T22:16:33.773

Link: CVE-2026-26164

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T00:00:11Z

Weaknesses