Description
Improper input validation in Power BI allows an authorized attacker to execute code over a network.
Published: 2026-02-10
Score: 8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description Improper input validation in Power BI allows an authorized attacker to execute code over a network.
Title Power BI Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft power Bi Report Server
Weaknesses CWE-20
CPEs cpe:2.3:a:microsoft:power_bi_report_server:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft power Bi Report Server
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Power Bi Report Server
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-05-11T21:25:23.894Z

Reserved: 2025-12-11T21:02:05.734Z

Link: CVE-2026-21229

cve-icon Vulnrichment

Updated: 2026-02-25T15:43:18.625Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T18:16:23.453

Modified: 2026-02-11T21:15:13.490

Link: CVE-2026-21229

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T01:15:20Z

Weaknesses