{"id":77513,"date":"2026-04-15T22:52:16","date_gmt":"2026-04-15T22:52:16","guid":{"rendered":"https:\/\/diyhaven858.wasmer.app\/index.php\/microsoft-patched-a-copilot-studio-prompt-injection-the-data-exfiltrated-anyway\/"},"modified":"2026-04-15T22:52:16","modified_gmt":"2026-04-15T22:52:16","slug":"microsoft-patched-a-copilot-studio-prompt-injection-the-data-exfiltrated-anyway","status":"publish","type":"post","link":"https:\/\/diyhaven858.wasmer.app\/index.php\/microsoft-patched-a-copilot-studio-prompt-injection-the-data-exfiltrated-anyway\/","title":{"rendered":"Microsoft patched a Copilot Studio prompt injection. The data exfiltrated anyway."},"content":{"rendered":"<p> <br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/images.ctfassets.net\/jdtwqhzvc2n1\/6QO34Fn3Ix5qFbnemAM3a5\/6cf10a1a9ecd680e39c790c0733d16fd\/HERO_CAPSULE.png?w=300&amp;q=30\" \/><\/p>\n<p>Microsoft assigned CVE-2026-21520, a CVSS 7.5 indirect prompt injection vulnerability, to Copilot Studio. Capsule Security discovered the flaw, coordinated disclosure with Microsoft, and the patch was deployed on January 15. Public disclosure went live on Wednesday.<\/p>\n<p>That CVE matters less for what it fixes and more for what it signals. Capsule\u2019s research calls Microsoft\u2019s decision to assign a CVE to a prompt injection vulnerability in an agentic platform \u201chighly unusual.\u201d Microsoft previously assigned CVE-2025-32711 (CVSS 9.3) to EchoLeak, a prompt injection in M365 Copilot patched in June 2025, but that targeted a productivity assistant, not an agent-building platform. If the precedent extends to agentic systems broadly, every enterprise running agents inherits a new vulnerability class to track. Except that this class cannot be fully eliminated by patches alone.<\/p>\n<p>Capsule also discovered what they call PipeLeak, a parallel indirect prompt injection vulnerability in Salesforce Agentforce. Microsoft patched and assigned a CVE. Salesforce has not assigned a CVE or issued a public advisory for PipeLeak as of publication, according to Capsule&#x27;s research. <\/p>\n<h2>What ShareLeak actually does<\/h2>\n<p>The vulnerability that the researchers named ShareLeak exploits the gap between a SharePoint form submission and the Copilot Studio agent\u2019s context window. An attacker fills a public-facing comment field with a crafted payload that injects a fake system role message. In Capsule\u2019s testing, Copilot Studio concatenated the malicious input directly with the agent\u2019s system instructions with no input sanitization between the form and the model.<\/p>\n<p>The injected payload overrode the agent\u2019s original instructions in Capsule\u2019s proof-of-concept, directing it to query connected SharePoint Lists for customer data and send that data via Outlook to an attacker-controlled email address. NVD classifies the attack as low complexity and requires no privileges.<\/p>\n<p>Microsoft\u2019s own safety mechanisms flagged the request as suspicious during Capsule\u2019s testing. The data was exfiltrated anyway. The DLP never fired because the email was routed through a legitimate Outlook action that the system treated as an authorized operation.<\/p>\n<p>Carter Rees, VP of Artificial Intelligence at Reputation, described the architectural failure in an exclusive VentureBeat interview. The LLM cannot inherently distinguish between trusted instructions and untrusted retrieved data, Rees said. It becomes a confused deputy acting on behalf of the attacker. OWASP classifies this pattern as ASI01: Agent Goal Hijack.<\/p>\n<p>The research team behind both discoveries, Capsule Security, found the Copilot Studio vulnerability on November 24, 2025. Microsoft confirmed it on December 5 and patched it on January 15, 2026. Every security director running Copilot Studio agents triggered by SharePoint forms should audit that window for indicators of compromise.<\/p>\n<h2>PipeLeak and the Salesforce split<\/h2>\n<p>PipeLeak hits the same vulnerability class through a different front door. In Capsule\u2019s testing, a public lead form payload hijacked an Agentforce agent with no authentication required. Capsule found no volume cap on the exfiltrated CRM data, and the employee who triggered the agent received no indication that data had left the building. Salesforce has not assigned a CVE or issued a public advisory specific to PipeLeak as of publication.<\/p>\n<p>Capsule is not the first research team to hit Agentforce with indirect prompt injection. Noma Labs disclosed ForcedLeak (CVSS 9.4) in September 2025, and Salesforce patched that vector by enforcing Trusted URL allowlists. According to Capsule&#x27;s research, PipeLeak survives that patch through a different channel: email via the agent&#x27;s authorized tool actions.<\/p>\n<p>Naor Paz, CEO of Capsule Security, told VentureBeat the testing hit no exfiltration limit. \u201cWe did not get to any limitation,\u201d Paz said. \u201cThe agent would just continue to leak all the CRM.\u201d<\/p>\n<p>Salesforce recommended human-in-the-loop as a mitigation. Paz pushed back. \u201cIf the human should approve every single operation, it\u2019s not really an agent,\u201d he told VentureBeat. \u201cIt\u2019s just a human clicking through the agent\u2019s actions.\u201d<\/p>\n<p>Microsoft patched ShareLeak and assigned a CVE. According to Capsule&#x27;s research, Salesforce patched ForcedLeak&#x27;s URL path but not the email channel.<\/p>\n<p>Kayne McGladrey, IEEE Senior Member, put it differently in a separate VentureBeat interview. Organizations are cloning human user accounts to agentic systems, McGladrey said, except agents use far more permissions than humans would because of the speed, the scale, and the intent.<\/p>\n<h2>The lethal trifecta and why posture management fails<\/h2>\n<p>Paz named the structural condition that makes any agent exploitable: access to private data, exposure to untrusted content, and the ability to communicate externally. ShareLeak hits all three. PipeLeak hits all three. Most production agents hit all three because that combination is what makes agents useful.<\/p>\n<p>Rees validated the diagnosis independently. Defense-in-depth predicated on deterministic rules is fundamentally insufficient for agentic systems, Rees told VentureBeat.<\/p>\n<p>Elia Zaitsev, CrowdStrike\u2019s CTO, called the patching mindset itself the vulnerability in a separate VentureBeat exclusive. \u201cPeople are forgetting about runtime security,\u201d he said. \u201cLet\u2019s patch all the vulnerabilities. Impossible. Somehow always seem to miss something.\u201d Observing actual kinetic actions is a structured, solvable problem, Zaitsev told VentureBeat. Intent is not. CrowdStrike\u2019s Falcon sensor walks the process tree and tracks what agents did, not what they appeared to intend.<\/p>\n<h2>Multi-turn crescendo and the coding agent blind spot<\/h2>\n<p>Single-shot prompt injections are the entry-level threat. Capsule\u2019s research documented multi-turn crescendo attacks where adversaries distribute payloads across multiple benign-looking turns. Each turn passes inspection. The attack becomes visible only when analyzed as a sequence.<\/p>\n<p>Rees explained why current monitoring misses this. A stateless WAF views each turn in a vacuum and detects no threat, Rees told VentureBeat. It sees requests, not a semantic trajectory.<\/p>\n<p>Capsule also found undisclosed vulnerabilities in coding agent platforms it declined to name, including memory poisoning that persists across sessions and malicious code execution through MCP servers. In one case, a file-level guardrail designed to restrict which files the agent could access was reasoned around by the agent itself, which found an alternate path to the same data. Rees identified the human vector: employees paste proprietary code into public LLMs and view security as friction.<\/p>\n<p>McGladrey cut to the governance failure. \u201cIf crime was a technology problem, we would have solved crime a fairly long time ago,\u201d he told VentureBeat. \u201cCybersecurity risk as a standalone category is a complete fiction.\u201d<\/p>\n<h2>The runtime enforcement model<\/h2>\n<p>Capsule hooks into vendor-provided agentic execution paths \u2014 including Copilot Studio&#x27;s security hooks and Claude Code&#x27;s pre-tool-use checkpoints \u2014 with no proxies, gateways, or SDKs. The company exited stealth on Wednesday, timing its $7 million seed round, led by Lama Partners alongside Forgepoint Capital International, to its coordinated disclosure.<\/p>\n<p>Chris Krebs, the first Director of CISA and a Capsule advisor, put the gap in operational terms. \u201cLegacy tools weren\u2019t built to monitor what happens between prompt and action,\u201d Krebs said. \u201cThat\u2019s the runtime gap.\u201d<\/p>\n<p>Capsule&#x27;s architecture deploys fine-tuned small language models that evaluate every tool call before execution, an approach Gartner&#x27;s market guide calls a &quot;guardian agent.&quot;<\/p>\n<p>Not everyone agrees that intent analysis is the right layer. Zaitsev told VentureBeat during an exclusive interview that intent-based detection is non-deterministic. \u201cIntent analysis will sometimes work. Intent analysis cannot always work,\u201d he said. CrowdStrike bets on observing what the agent actually did rather than what it appeared to intend. Microsoft\u2019s own Copilot Studio documentation provides external security-provider webhooks that can approve or block tool execution, offering a vendor-native control plane alongside third-party options. No single layer closes the gap. Runtime intent analysis, kinetic action monitoring, and foundational controls (least privilege, input sanitization, outbound restrictions, targeted human-in-the-loop) all belong in the stack. SOC teams should map telemetry now: Copilot Studio activity logs plus webhook decisions, CRM audit logs for Agentforce, and EDR process-tree data for coding agents.<\/p>\n<p>Paz described the broader shift. \u201cIntent is the new perimeter,\u201d he told VentureBeat. \u201cThe agent in runtime can decide to go rogue on you.\u201d<\/p>\n<h2>VentureBeat Prescriptive Matrix<\/h2>\n<p>The following matrix maps five vulnerability classes against the controls that miss them, and the specific actions security directors should take this week.<\/p>\n<table>\n<tbody>\n<tr>\n<td>\n<p><b>Vulnerability Class<\/b><\/p>\n<\/td>\n<td>\n<p><b>Why Current Controls Miss It<\/b><\/p>\n<\/td>\n<td>\n<p><b>What Runtime Enforcement Does<\/b><\/p>\n<\/td>\n<td>\n<p><b>Suggested actions for security leaders<\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><b>ShareLeak <\/b>\u2014 Copilot Studio, CVE-2026-21520, CVSS 7.5, patched Jan 15 2026<\/p>\n<\/td>\n<td>\n<p>Capsule\u2019s testing found no input sanitization between the SharePoint form and the agent context. Safety mechanisms flagged, but data still exfiltrated. DLP did not fire because the email used a legitimate Outlook action. OWASP ASI01: Agent Goal Hijack.<\/p>\n<\/td>\n<td>\n<p>Guardian agent hooks into Copilot Studio pre-tool-use security hooks. Vets every tool call before execution. Blocks exfiltration at the action layer.<\/p>\n<\/td>\n<td>\n<p>Audit every Copilot Studio agent triggered by SharePoint forms. Restrict outbound email to org-only domains. Inventory all SharePoint Lists accessible to agents. Review the Nov 24\u2013Jan 15 window for indicators of compromise.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><b>PipeLeak <\/b>\u2014 Agentforce, no CVE assigned<\/p>\n<\/td>\n<td>\n<p>In Capsule\u2019s testing, public form input flowed directly into the agent context. No auth required. No volume cap observed on exfiltrated CRM data. The employee received no indication that data was leaving.<\/p>\n<\/td>\n<td>\n<p>Runtime interception via platform agentic hooks. Pre-invocation checkpoint on every tool call. Detects outbound data transfer to non-approved destinations.<\/p>\n<\/td>\n<td>\n<p>Review all Agentforce automations triggered by public-facing forms. Enable human-in-the-loop for external comms as interim control. Audit CRM data access scope per agent. Pressure Salesforce for CVE assignment.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><b>Multi-Turn Crescendo <\/b>\u2014 distributed payload, each turn looks benign<\/p>\n<\/td>\n<td>\n<p>Stateless monitoring inspects each turn in isolation. WAFs, DLP, and activity logs see individual requests, not semantic trajectory.<\/p>\n<\/td>\n<td>\n<p>Stateful runtime analysis tracks full conversation history across turns. Fine-tuned SLMs evaluate aggregated context. Detects when a cumulative sequence constitutes a policy violation.<\/p>\n<\/td>\n<td>\n<p>Require stateful monitoring for all production agents. Add crescendo attack scenarios to red team exercises.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><b>Coding Agents <\/b>\u2014 unnamed platforms, memory poisoning + code execution<\/p>\n<\/td>\n<td>\n<p>MCP servers inject code and instructions into the agent context. Memory poisoning persists across sessions. Guardrails reasoned around by the agent itself. Shadow AI insiders paste proprietary code into public LLMs.<\/p>\n<\/td>\n<td>\n<p>Pre-invocation checkpoint on every tool call. Fine-tuned SLMs detect anomalous tool usage at runtime.<\/p>\n<\/td>\n<td>\n<p>Inventory all coding agent deployments across engineering. Audit MCP server configs. Restrict code execution permissions. Monitor for shadow installations.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><b>Structural Gap <\/b>\u2014 any agent with private data + untrusted input + external comms<\/p>\n<\/td>\n<td>\n<p>Posture management tells you what should happen. It does not stop what does happen. Agents use far more permissions than humans at far greater speed.<\/p>\n<\/td>\n<td>\n<p>Runtime guardian agent watches every action in real time. Intent-based enforcement replaces signature detection. Leverages vendor agentic hooks, not proxies or gateways.<\/p>\n<\/td>\n<td>\n<p>Classify every agent by lethal trifecta exposure. Treat prompt injection as class-based SaaS risk. Require runtime security for any agent moving to production. Brief the board on agent risk as business risk.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>What this means for 2026 security planning<\/h2>\n<p>Microsoft\u2019s CVE assignment will either accelerate or fragment how the industry handles agent vulnerabilities. If vendors call them configuration issues, CISOs carry the risk alone.<\/p>\n<p>Treat prompt injection as a class-level SaaS risk rather than individual CVEs. Classify every agent deployment against the lethal trifecta. Require runtime enforcement for anything moving to production. Brief the board on agent risk the way McGladrey framed it: as business risk, because cybersecurity risk as a standalone category stopped being useful the moment agents started operating at machine speed.<\/p>\n<p><br \/>\n<br \/><a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft assigned CVE-2026-21520, a CVSS 7.5 indirect prompt injection vulnerability, to Copilot Studio. Capsule Security discovered the flaw, coordinated disclosure with Microsoft, and the patch was deployed on January 15. Public disclosure went live on Wednesday. That CVE matters less for what it fixes and more for what it signals. Capsule\u2019s research calls Microsoft\u2019s decision [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":77514,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_daextam_enable_autolinks":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[11],"tags":[],"class_list":["post-77513","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-news"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/diyhaven858.wasmer.app\/wp-content\/uploads\/2026\/04\/HERO_CAPSULE.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/posts\/77513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/comments?post=77513"}],"version-history":[{"count":0,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/posts\/77513\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/media\/77514"}],"wp:attachment":[{"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/media?parent=77513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/categories?post=77513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/tags?post=77513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}