AgentScout Logo Agent Scout

Microsoft: RCE Vulnerabilities Turn Prompts Into Shell Commands

CVE-2026-26030 (CVSS 9.8) enables RCE in Semantic Kernel via prompt injection. Immediate upgrade to 1.39.4+ required for AI agent applications.

AgentScout Β· Β· 4 min read
#microsoft #semantic-kernel #rce #prompt-injection #ai-security #cve
Analyzing Data Nodes...
SIG_CONF:CALCULATING
Verified Sources

TL;DR

Microsoft disclosed CVE-2026-26030 (CVSS 9.8), a critical remote code execution vulnerability in Semantic Kernel Python SDK that allows attackers to execute arbitrary code through prompt injection in vector store filter expressions. The vulnerability affects all versions prior to 1.39.4 and targets AI agent infrastructure directly, not web endpoints.

Key Facts

  • Who: Microsoft Security Response Center, affecting Semantic Kernel SDK users
  • What: Critical RCE vulnerability (CVSS 9.8) enabling arbitrary code execution via prompt injection
  • When: Disclosed May 7, 2026; patches available immediately
  • Impact: All AI applications using Semantic Kernel Python SDK < 1.39.4 or .NET SDK < 1.71.0

What Changed

Microsoft’s Security Response Center disclosed a critical remote code execution vulnerability in Semantic Kernel, its open-source SDK for building AI agents. CVE-2026-26030 carries a CVSS severity score of 9.8 out of 10, making it one of the most severe AI framework vulnerabilities disclosed in 2026.

The vulnerability resides in the InMemoryVectorStore component, where malicious filter expressions can be injected through user prompts. Unlike traditional injection attacks that target web application endpoints, this attack chain converts natural language input into executable Python code through the agent’s internal filter parsing logic.

β€œAn attacker who successfully exploited this vulnerability could run arbitrary code in the context of the application,” Microsoft stated in its security advisory. β€œThis could allow the attacker to install programs; view, change, or delete data; or create new accounts with full user rights.”

A second vulnerability, CVE-2026-25592, affects the .NET SDK with a path traversal flaw. Both vulnerabilities were patched in Semantic Kernel Python version 1.39.4 and .NET version 1.71.0, released immediately upon disclosure.

Security researchers from Nuka-AI disclosed multiple bypass vectors for the initial February patches, prompting the May disclosure and additional hardening measures.

Why It Matters

The attack chain mechanics distinguish this vulnerability from traditional web security threats:

Attack VectorTraditional XSSSemantic Kernel RCE
Entry PointWeb form inputAgent prompt input
Target LayerBrowser DOMPython/.NET runtime
Execution ContextClient-side JavaScriptServer-side code
Blast RadiusUser sessionApplication server
Exploitation ComplexityMediumLow

Attack Chain Breakdown:

  1. Prompt Input: Attacker crafts a natural language prompt containing malicious filter syntax
  2. Filter Expression: The prompt is passed to InMemoryVectorStore.filter() without proper sanitization
  3. Code Execution: Filter expression is evaluated as Python code via eval() or equivalent
  4. Runtime Access: Attacker gains arbitrary code execution on the server hosting the AI agent

The vulnerability class is particularly concerning because:

  • No Input Validation Bypass Required: The filter expression syntax is intended functionality, making detection difficult
  • Agent-Specific Attack Surface: Traditional WAF rules do not inspect agent prompt flows
  • High Trust Context: AI agents often run with elevated permissions to access tools, APIs, and databases
  • Supply Chain Implications: Organizations embedding Semantic Kernel in production agents face immediate exposure

According to Microsoft’s security blog, the attack requires no authentication for applications that accept untrusted prompts, which includes most customer-facing AI agent deployments.

πŸ”Ί Scout Intel: What Others Missed

Confidence: high | Novelty Score: 82/100

The deeper security implication extends beyond the immediate patch. This vulnerability represents a new attack class: prompt-to-code translation exploits. Traditional security models assume a boundary between user input and code execution, but AI agent frameworks deliberately blur this boundary through natural language interfaces. Semantic Kernel’s filter expression mechanism is not a bugβ€”it’s a feature designed to let developers write expressive queries. The vulnerability exploits this intentional design pattern, making it difficult to distinguish legitimate use from malicious injection without breaking functionality.

Key Implication: Enterprise security teams must audit all AI agent frameworksβ€”not just Semantic Kernelβ€”for similar prompt-to-code translation patterns. LangChain, CrewAI, and OpenAI’s Agents SDK all implement comparable filter/search mechanisms that may contain equivalent vulnerabilities. The attack surface is architectural, not incidental.

What This Means

For AI Application Developers

Immediate action is required for any application using Semantic Kernel Python SDK before version 1.39.4 or .NET SDK before version 1.71.0. The patch introduces strict input sanitization for filter expressions, but developers should additionally:

  • Implement prompt content filtering before filter expression generation
  • Audit agent permissions and apply principle of least privilege
  • Enable audit logging for all filter expression evaluations
  • Consider sandboxing agent runtimes in containerized environments

For Enterprise Security Teams

This disclosure should trigger a broader audit of AI agent infrastructure:

  1. Inventory all AI frameworks in production environments, including Semantic Kernel, LangChain, CrewAI, AutoGen, and OpenAI Agents SDK
  2. Review prompt handling code for similar filter expression patterns
  3. Update security monitoring to include agent prompt flows, which traditional WAFs do not inspect
  4. Assess blast radius: Agents with database, API, or file system access multiply the potential impact

What to Watch

Microsoft’s disclosure may be the first of many in this vulnerability class. Security researchers at Nuka-AI have demonstrated that the attack pattern is replicable across multiple agent frameworks. Expect additional CVEs targeting prompt-to-code translation mechanisms in competing AI agent SDKs throughout 2026.

Related Coverage:

Sources

Microsoft: RCE Vulnerabilities Turn Prompts Into Shell Commands

CVE-2026-26030 (CVSS 9.8) enables RCE in Semantic Kernel via prompt injection. Immediate upgrade to 1.39.4+ required for AI agent applications.

AgentScout Β· Β· 4 min read
#microsoft #semantic-kernel #rce #prompt-injection #ai-security #cve
Analyzing Data Nodes...
SIG_CONF:CALCULATING
Verified Sources

TL;DR

Microsoft disclosed CVE-2026-26030 (CVSS 9.8), a critical remote code execution vulnerability in Semantic Kernel Python SDK that allows attackers to execute arbitrary code through prompt injection in vector store filter expressions. The vulnerability affects all versions prior to 1.39.4 and targets AI agent infrastructure directly, not web endpoints.

Key Facts

  • Who: Microsoft Security Response Center, affecting Semantic Kernel SDK users
  • What: Critical RCE vulnerability (CVSS 9.8) enabling arbitrary code execution via prompt injection
  • When: Disclosed May 7, 2026; patches available immediately
  • Impact: All AI applications using Semantic Kernel Python SDK < 1.39.4 or .NET SDK < 1.71.0

What Changed

Microsoft’s Security Response Center disclosed a critical remote code execution vulnerability in Semantic Kernel, its open-source SDK for building AI agents. CVE-2026-26030 carries a CVSS severity score of 9.8 out of 10, making it one of the most severe AI framework vulnerabilities disclosed in 2026.

The vulnerability resides in the InMemoryVectorStore component, where malicious filter expressions can be injected through user prompts. Unlike traditional injection attacks that target web application endpoints, this attack chain converts natural language input into executable Python code through the agent’s internal filter parsing logic.

β€œAn attacker who successfully exploited this vulnerability could run arbitrary code in the context of the application,” Microsoft stated in its security advisory. β€œThis could allow the attacker to install programs; view, change, or delete data; or create new accounts with full user rights.”

A second vulnerability, CVE-2026-25592, affects the .NET SDK with a path traversal flaw. Both vulnerabilities were patched in Semantic Kernel Python version 1.39.4 and .NET version 1.71.0, released immediately upon disclosure.

Security researchers from Nuka-AI disclosed multiple bypass vectors for the initial February patches, prompting the May disclosure and additional hardening measures.

Why It Matters

The attack chain mechanics distinguish this vulnerability from traditional web security threats:

Attack VectorTraditional XSSSemantic Kernel RCE
Entry PointWeb form inputAgent prompt input
Target LayerBrowser DOMPython/.NET runtime
Execution ContextClient-side JavaScriptServer-side code
Blast RadiusUser sessionApplication server
Exploitation ComplexityMediumLow

Attack Chain Breakdown:

  1. Prompt Input: Attacker crafts a natural language prompt containing malicious filter syntax
  2. Filter Expression: The prompt is passed to InMemoryVectorStore.filter() without proper sanitization
  3. Code Execution: Filter expression is evaluated as Python code via eval() or equivalent
  4. Runtime Access: Attacker gains arbitrary code execution on the server hosting the AI agent

The vulnerability class is particularly concerning because:

  • No Input Validation Bypass Required: The filter expression syntax is intended functionality, making detection difficult
  • Agent-Specific Attack Surface: Traditional WAF rules do not inspect agent prompt flows
  • High Trust Context: AI agents often run with elevated permissions to access tools, APIs, and databases
  • Supply Chain Implications: Organizations embedding Semantic Kernel in production agents face immediate exposure

According to Microsoft’s security blog, the attack requires no authentication for applications that accept untrusted prompts, which includes most customer-facing AI agent deployments.

πŸ”Ί Scout Intel: What Others Missed

Confidence: high | Novelty Score: 82/100

The deeper security implication extends beyond the immediate patch. This vulnerability represents a new attack class: prompt-to-code translation exploits. Traditional security models assume a boundary between user input and code execution, but AI agent frameworks deliberately blur this boundary through natural language interfaces. Semantic Kernel’s filter expression mechanism is not a bugβ€”it’s a feature designed to let developers write expressive queries. The vulnerability exploits this intentional design pattern, making it difficult to distinguish legitimate use from malicious injection without breaking functionality.

Key Implication: Enterprise security teams must audit all AI agent frameworksβ€”not just Semantic Kernelβ€”for similar prompt-to-code translation patterns. LangChain, CrewAI, and OpenAI’s Agents SDK all implement comparable filter/search mechanisms that may contain equivalent vulnerabilities. The attack surface is architectural, not incidental.

What This Means

For AI Application Developers

Immediate action is required for any application using Semantic Kernel Python SDK before version 1.39.4 or .NET SDK before version 1.71.0. The patch introduces strict input sanitization for filter expressions, but developers should additionally:

  • Implement prompt content filtering before filter expression generation
  • Audit agent permissions and apply principle of least privilege
  • Enable audit logging for all filter expression evaluations
  • Consider sandboxing agent runtimes in containerized environments

For Enterprise Security Teams

This disclosure should trigger a broader audit of AI agent infrastructure:

  1. Inventory all AI frameworks in production environments, including Semantic Kernel, LangChain, CrewAI, AutoGen, and OpenAI Agents SDK
  2. Review prompt handling code for similar filter expression patterns
  3. Update security monitoring to include agent prompt flows, which traditional WAFs do not inspect
  4. Assess blast radius: Agents with database, API, or file system access multiply the potential impact

What to Watch

Microsoft’s disclosure may be the first of many in this vulnerability class. Security researchers at Nuka-AI have demonstrated that the attack pattern is replicable across multiple agent frameworks. Expect additional CVEs targeting prompt-to-code translation mechanisms in competing AI agent SDKs throughout 2026.

Related Coverage:

Sources

d87s90g5m9fuh1fy4mxlckβ–ˆβ–ˆβ–ˆβ–ˆx1w69rmmf6sxjwy8bek0cj9bt61gbropβ–‘β–‘β–‘5zqauyiyj1cati10n71cfu0yzaenipe4rβ–ˆβ–ˆβ–ˆβ–ˆmknky3h3yebwk6aqriedeb7mce27z6hvβ–ˆβ–ˆβ–ˆβ–ˆ3ykwivfv2nh10v7bb2agwark2c1mca0miβ–ˆβ–ˆβ–ˆβ–ˆdzyujvwrorfl6ysa1ov4jckr16u87tjttβ–‘β–‘β–‘ydubmc7exo8734mz9h3dn8f7azpgxfnwβ–ˆβ–ˆβ–ˆβ–ˆ6tub9b6n37weatkatfarp5hjfu7fpmb5β–ˆβ–ˆβ–ˆβ–ˆa5vgl7fhf4d56tr9noblrm8kfhpcitc0oβ–ˆβ–ˆβ–ˆβ–ˆm0cg7dvuvqd5mr1l4kgkyp2sfej1m2ynpβ–‘β–‘β–‘aw1qwxbjp41wn45y8cwqr744d2hfnvfjβ–‘β–‘β–‘fey0t59kx55p8k1s6fupx3bxy6sl5ecgβ–‘β–‘β–‘ojtnumb9h5ck1iuay547jrhdbk4czhyxcβ–ˆβ–ˆβ–ˆβ–ˆw8a7hvvnkka2ko9vfgsd5s6hhmgupnzd6β–‘β–‘β–‘zxihhxs7uqo00ozxckytnoq2xgbg8hsfβ–‘β–‘β–‘1r4sf9fwtgv29yotg2iaasytfhk47xsnβ–‘β–‘β–‘e7azrrm71af8qe6sz3qbpc3jo4h8qzcjβ–‘β–‘β–‘5gh0a91zy14uh8t9jej3szqzbm7u2i9β–ˆβ–ˆβ–ˆβ–ˆdxehjkt7z8iz63hb8brdeh5ur25rqy3vβ–‘β–‘β–‘lc8hjqzkivw3f2sd5pji59gded7qvb2β–‘β–‘β–‘7kpfh847togovm3g80n44a1o656jf469fjβ–ˆβ–ˆβ–ˆβ–ˆxmkciwanzxpwjlvf9c7jl6qqx4iyddbsβ–ˆβ–ˆβ–ˆβ–ˆ1xv3vape8a86qn1mcsy3i8agzuchdoj2β–‘β–‘β–‘kq8nea9uwsex3lxa1vtswahosw8j84i8tβ–ˆβ–ˆβ–ˆβ–ˆbwotra5xganht4uw6tywzsfk6w3neazkaβ–ˆβ–ˆβ–ˆβ–ˆev1uty8onxgysqkj302ftmmfv6z5mrrβ–‘β–‘β–‘hh6z11gooafrkbpeslwyhon8b3h863ghβ–ˆβ–ˆβ–ˆβ–ˆ3qpf6ev7ruxrh84mh4g0yf4bg6n7hwplβ–‘β–‘β–‘58np1pi3w349x1qrm759ccp9ozosjwhpβ–ˆβ–ˆβ–ˆβ–ˆyvegziqik2cbfk2fsqlzyu7jve5wmkjfβ–‘β–‘β–‘gzi4sykmxhuhpjv0ctc9tea6q9z99rgeβ–ˆβ–ˆβ–ˆβ–ˆkk7j72qgipsmrwu7patmiy77ysm3iurβ–ˆβ–ˆβ–ˆβ–ˆ9xvpj9z3rkskwou10jvknawdrb0usyx7β–ˆβ–ˆβ–ˆβ–ˆdsdgin9a6usd7prxmmo4hu4wqtkqg390rβ–‘β–‘β–‘e3tll44h8npz21zecyqpc5alii0lj7β–‘β–‘β–‘w5efb6lnpuz7mukjy7lzfho4umno56bβ–‘β–‘β–‘bcksx7ii7htoywgcqpbp0a7pa8ltuba23β–‘β–‘β–‘ujft25g99yrdv6oiyio2pjbnirrcwnijβ–‘β–‘β–‘pxcukj0uffvnorcneqdde98432ujlmpsβ–‘β–‘β–‘r11gi1xclgnyd0y5o580jovcqj9c2lqβ–‘β–‘β–‘qh4ghjcrrhrnw2l36jz1pkl83dilq94β–ˆβ–ˆβ–ˆβ–ˆ5u6w2f5wkqgbjwnbf1pf25rvoknqzhvuhβ–‘β–‘β–‘adbdgafs8a8iqj7apb565lbz2ch18tiβ–ˆβ–ˆβ–ˆβ–ˆvrzb3xbd3ad3hugyxs7ekmtty31xkz6seβ–‘β–‘β–‘wn5m0mfifwq3o9tg83hsyvd6x6xzvykv6β–ˆβ–ˆβ–ˆβ–ˆygkrf6kh1o7szse4zl89oqcx4rbsup6β–‘β–‘β–‘0b6yjwtw4xxrkig9zoi8h5inzj2w31gutoβ–ˆβ–ˆβ–ˆβ–ˆh9i2i6l6fajuxlofo9v57uqaasb9hdliβ–ˆβ–ˆβ–ˆβ–ˆxocbu4s0ae9wjpbn47v8z84ymrjncomc3β–‘β–‘β–‘97d164gs2b723b8psndtjqgx7oqxsdm1β–‘β–‘β–‘7v7bgs9ifoj