Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xjw9-4gw8-4rqx | Microsoft Semantic Kernel InMemoryVectorStore filter functionality vulnerable to remote code execution |
Tue, 03 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft semantic Kernel
|
|
| CPEs | cpe:2.3:a:microsoft:semantic_kernel:*:*:*:*:*:python:*:* | |
| Vendors & Products |
Microsoft semantic Kernel
|
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft semantic-kernel |
|
| Vendors & Products |
Microsoft
Microsoft semantic-kernel |
Fri, 20 Feb 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Semantic Kernel, Microsoft's semantic kernel Python SDK, has a remote code execution vulnerability in versions prior to 1.39.4, specifically within the `InMemoryVectorStore` filter functionality. The problem has been fixed in version `python-1.39.4`. Users should upgrade this version or higher. As a workaround, avoid using `InMemoryVectorStore` for production scenarios. | |
| Title | Microsoft Semantic Kernel InMemoryVectorStore filter functionality vulnerable to remote code execution | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-26T14:44:14.276Z
Reserved: 2026-02-09T21:36:29.555Z
Link: CVE-2026-26030
Updated: 2026-02-19T20:57:43.989Z
Status : Analyzed
Published: 2026-02-19T17:24:50.487
Modified: 2026-03-03T16:32:10.810
Link: CVE-2026-26030
No data.
OpenCVE Enrichment
Updated: 2026-04-17T18:15:26Z
Github GHSA