Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 29 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:microsoft:365_copilot:-:*:*:*:*:*:*:* |
Fri, 24 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Url redirection to untrusted site ('open redirect') in M365 Copilot allows an unauthorized attacker to elevate privileges over a network. | |
| Title | Microsoft 365 Copilot Elevation of Privilege Vulnerability | |
| First Time appeared |
Microsoft
Microsoft 365 Copilot |
|
| Weaknesses | CWE-601 | |
| CPEs | cpe:2.3:a:microsoft:365_copilot:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Microsoft
Microsoft 365 Copilot |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2026-05-12T17:37:46.760Z
Reserved: 2026-03-17T20:15:23.719Z
Link: CVE-2026-33102
Updated: 2026-04-24T16:21:13.808Z
Status : Analyzed
Published: 2026-04-23T22:16:37.093
Modified: 2026-04-29T19:04:21.620
Link: CVE-2026-33102
No data.
OpenCVE Enrichment
Updated: 2026-04-28T07:30:26Z