CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
Lifecycle Timeline
4Description
Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Analysis
CVE-2025-32711 is an AI command injection vulnerability in Microsoft 365 Copilot that enables unauthenticated network-based attacks to disclose sensitive information without user interaction. The vulnerability affects M365 Copilot deployments and allows attackers to inject malicious commands that bypass normal authorization controls. With a critical CVSS score of 9.3 and no authentication requirement, this poses an immediate risk to organizations using Copilot features; exploitation status and POC availability require confirmation through Microsoft security advisories.
Technical Context
This vulnerability exploits improper input validation in the AI command processing pipeline of Microsoft 365 Copilot, classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - Injection). The root cause involves insufficient sanitization of user-supplied input before execution in the Copilot AI inference engine. The attack leverages the natural language processing interface where Copilot interprets user commands, allowing attackers to craft specially-formed prompts that escape intended command boundaries and execute unintended operations. The vulnerability likely affects the cloud-hosted M365 Copilot service (potentially CPE references: cpe:2.7:a:microsoft:365_copilot:*:*:*:*:*:*:*:* or related M365 enterprise components) and impacts the confidentiality control layer through information disclosure pathways.
Affected Products
Microsoft 365 Copilot (all current versions until patch release). Potentially affected components include: M365 Copilot service (web and client applications), organizations with Copilot Pro or enterprise Copilot enabled. CPE likely includes: cpe:2.7:a:microsoft:365_copilot and related variants. Affected versions: Requires confirmation from Microsoft security advisory; typically includes all versions prior to the security update release. Configuration: All deployments with Copilot AI inference enabled are affected. Consult Microsoft Security Update Guide and official M365 security advisories for definitive version mapping and patch availability.
Remediation
Immediate actions: (1) Apply security updates from Microsoft as released—monitor Microsoft Security Update Guide and M365 Copilot security advisories for patch version numbers; (2) For unpatched environments, consider temporarily disabling Copilot features if feasible until patches are available; (3) Implement network-based controls to restrict Copilot API endpoints to authorized internal traffic only; (4) Enable enhanced logging and monitoring of Copilot command execution to detect injection attempts; (5) Review M365 admin center for audit logs related to Copilot usage anomalies. Workarounds (pending patch): Restrict Copilot access to specific user groups, disable Copilot in sensitive data contexts, implement additional input validation at the application layer. Links: Await Microsoft Security Response Center (MSRC) advisory at https://msrc.microsoft.com/ and M365 Admin Center security alerts.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18114