Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 02 Feb 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:microsoft:365_word_copilot:-:*:*:*:*:*:*:* |
Fri, 23 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper neutralization of escape, meta, or control sequences in Copilot allows an unauthorized attacker to disclose information over a network. | |
| Title | Word Copilot Information Disclosure Vulnerability | |
| First Time appeared |
Microsoft
Microsoft 365 Word Copilot |
|
| Weaknesses | CWE-150 | |
| CPEs | cpe:2.3:a:microsoft:365_word_copilot:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Microsoft
Microsoft 365 Word Copilot |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2026-04-01T13:49:27.034Z
Reserved: 2025-12-30T18:10:54.846Z
Link: CVE-2026-21521
Updated: 2026-01-23T20:02:10.801Z
Status : Analyzed
Published: 2026-01-22T23:15:57.823
Modified: 2026-02-02T13:30:53.350
Link: CVE-2026-21521
No data.
OpenCVE Enrichment
Updated: 2026-04-16T07:45:06Z