Critical (9.9)

Microsoft RCE Vulnerability (CVE-2026-26030)

CVE-2026-26030

Semantic Kernel, Microsoft's semantic kernel Python SDK, has a remote code execution vulnerability in versions prior to 1.39.4, specifically within the `InMemoryVectorStore` filter functionality. The ...

Affected: Microsoft Linux Kernel Python

Overview

A critical security vulnerability has been identified in Microsoft’s Semantic Kernel Python SDK. This flaw could allow an attacker to execute arbitrary code on affected systems remotely. The issue is present in versions prior to python-1.39.4.

Vulnerability Details

The vulnerability exists within the InMemoryVectorStore component, specifically in its filter functionality. In simple terms, this component is used for storing and searching data. Due to improper handling of input within the filter feature, a maliciously crafted request can trick the system into running harmful code. This type of flaw is known as a Remote Code Execution (RCE) vulnerability.

Impact

This is a CRITICAL severity vulnerability with a CVSS score of 9.9. If exploited, an unauthenticated remote attacker could gain the ability to run any command or code on the server hosting the vulnerable Semantic Kernel application. This could lead to:

  • Complete compromise of the affected server.
  • Theft, modification, or deletion of sensitive data.
  • Use of the server as a foothold for further attacks within your network.
  • Service disruption and operational downtime.

Affected Versions

All versions of the semantic-kernel Python package prior to 1.39.4 are vulnerable if they utilize the InMemoryVectorStore.

Remediation and Mitigation

Immediate action is required to secure your systems.

Primary Fix: Upgrade The definitive solution is to upgrade the semantic-kernel package to version 1.39.4 or higher.

pip install --upgrade semantic-kernel>=1.39.4

Workaround If you cannot upgrade immediately, you must implement a strict workaround:

  • Do not use InMemoryVectorStore in any production environment. This component is intended for development and testing purposes only. Replace it with a persistent, production-ready vector store like Azure AI Search, PostgreSQL with the pgvector extension, or Qdrant.

Additional Actions

  • Review your applications to confirm usage of InMemoryVectorStore.
  • Monitor your systems for any suspicious activity, as this vulnerability may be exploitable without leaving obvious signs.
  • Ensure your development teams are aware that InMemoryVectorStore is not designed for production use, even after applying this security update.

By upgrading or applying the workaround, you eliminate the risk posed by this severe vulnerability.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Am I Affected by CVE-2026-26030?

Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.

Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.

Related Advisories

Other Microsoft Vulnerabilities

View all Microsoft vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.