Description
Use after free in Windows Shell allows an authorized attacker to elevate privileges locally.
Published: 2026-04-14
Score: 7 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch Now
AI Analysis

Impact

A use‑after‑free flaw in Windows Shell can be exploited by an authorized user to gain elevated privileges. The flaw occurs when the shell frees memory in an incorrect order, leaving a dangling pointer that can be leveraged to execute code with higher rights. As a result, an attacker could step from a limited user context to an elevated or administrator level, compromising system integrity. The vulnerability is mapped to CWE‑416.

Affected Systems

Microsoft Windows 11 releases 22H3, 23H2, 24H2, 25H2, 26H1 and Microsoft Windows Server 2022 (including the Server Core 23H2 edition) and Windows Server 2025 are affected. All listed builds are vulnerable; the issue is present in the shell component of these operating systems.

Risk and Exploitability

The CVSS score of 7 indicates high severity, and the EPSS score is not available, so the exact execution probability is unknown. The vulnerability is not listed in CISA’s KEV catalog, but the local‑attack requirement and the possibility of privilege escalation make it a serious risk. An attacker who can run code in a normal user session could exploit the use‑after‑free to gain administrative rights, potentially impacting confidentiality, integrity, and availability of the machine. The attack vector is local and would require that the victim be logged on or have a user‑level application interface to the shell.

Generated by OpenCVE AI on April 14, 2026 at 18:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Windows security update for CVE‑2026‑26165 from Microsoft and verify installation via Windows Update or the Microsoft Security Update Guide.
  • If the update is unavailable, schedule a system reboot after installing the most recent cumulative update that contains the fix for this issue.
  • Confirm that the patch has been applied by checking the update history or sysdm.cpl for the updated security rollup date.
  • Until the patch can be applied, limit use of Windows Shell to users with the least privileges and monitor for suspicious activity.

Generated by OpenCVE AI on April 14, 2026 at 18:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 11 22h3
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2022, 23h2 Edition (server Core Installation)
Microsoft windows Server 2025 (server Core Installation)
Vendors & Products Microsoft windows 11 22h3
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2022, 23h2 Edition (server Core Installation)
Microsoft windows Server 2025 (server Core Installation)

Tue, 14 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description Use after free in Windows Shell allows an authorized attacker to elevate privileges locally.
Title Windows Shell Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2022
Microsoft windows Server 2025
Microsoft windows Server 23h2
Weaknesses CWE-416
CPEs cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_26H1:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2022
Microsoft windows Server 2025
Microsoft windows Server 23h2
References
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 11 22h3 Windows 11 23h2 Windows 11 23h2 Windows 11 24h2 Windows 11 24h2 Windows 11 25h2 Windows 11 25h2 Windows 11 26h1 Windows 11 26h1 Windows Server 2022 Windows Server 2022, 23h2 Edition (server Core Installation) Windows Server 2025 Windows Server 2025 (server Core Installation) Windows Server 23h2
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-17T16:11:57.535Z

Reserved: 2026-02-11T18:33:57.776Z

Link: CVE-2026-26165

cve-icon Vulnrichment

Updated: 2026-04-14T18:01:41.002Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-14T18:16:49.807

Modified: 2026-04-17T15:10:35.607

Link: CVE-2026-26165

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:02:47Z

Weaknesses