VentureBeat AI

Microsoft patched a Copilot Studio prompt injection. The data exfiltrated anyway.

β€’9 min readβ€’
#rag#deployment#llm#compute
Microsoft patched a Copilot Studio prompt injection. The data exfiltrated anyway.
Level:Intermediate
For:AI Security Engineers, ML Engineers, Data Scientists
✦TL;DR

Microsoft has patched a CVE-2026-21520 vulnerability in Copilot Studio, a CVSS 7.5 indirect prompt injection vulnerability that was discovered by Capsule Security, allowing for potential data exfiltration. Despite the patch being deployed on January 15, the vulnerability still poses a risk as data exfiltration was possible, highlighting the ongoing challenges in securing AI-powered tools like Copilot Studio.

⚑ Key Takeaways

  • A CVE-2026-21520 vulnerability was discovered in Microsoft's Copilot Studio, classified as a CVSS 7.5 indirect prompt injection vulnerability.
  • The vulnerability was discovered by Capsule Security and a patch was deployed by Microsoft on January 15, with public disclosure following on Wednesday.
  • Despite the patch, data exfiltration was still possible, underscoring the complexities of securing AI-driven systems against prompt injection attacks.

Want the full story? Read the original article.

Read on VentureBeat AI β†—

Share this summary

𝕏 Twitterin LinkedIn

More like this

Frontier models are failing one in three production attempts β€” and getting harder to audit

VentureBeat AIβ€’#deployment

Meta researchers introduce 'hyperagents' to unlock self-improving AI for non-coding tasks

VentureBeat AIβ€’#agentic workflows

We tested Anthropic’s redesigned Claude Code desktop app and 'Routines' β€” here's what enterprises should know

VentureBeat AIβ€’#agentic workflows

AI's next bottleneck isn't the models β€” it's whether agents can think together

VentureBeat AIβ€’#agentic workflows