Microsoft RCE Vulnerability (CVE-2026-26030)
CVE-2026-26030
Semantic Kernel, Microsoft's semantic kernel Python SDK, has a remote code execution vulnerability in versions prior to 1.39.4, specifically within the `InMemoryVectorStore` filter functionality. The ...
Overview
A critical security vulnerability has been identified in Microsoft’s Semantic Kernel Python SDK. This flaw could allow an attacker to execute arbitrary code on affected systems remotely. The issue is present in versions prior to python-1.39.4.
Vulnerability Details
The vulnerability exists within the InMemoryVectorStore component, specifically in its filter functionality. In simple terms, this component is used for storing and searching data. Due to improper handling of input within the filter feature, a maliciously crafted request can trick the system into running harmful code. This type of flaw is known as a Remote Code Execution (RCE) vulnerability.
Impact
This is a CRITICAL severity vulnerability with a CVSS score of 9.9. If exploited, an unauthenticated remote attacker could gain the ability to run any command or code on the server hosting the vulnerable Semantic Kernel application. This could lead to:
- Complete compromise of the affected server.
- Theft, modification, or deletion of sensitive data.
- Use of the server as a foothold for further attacks within your network.
- Service disruption and operational downtime.
Affected Versions
All versions of the semantic-kernel Python package prior to 1.39.4 are vulnerable if they utilize the InMemoryVectorStore.
Remediation and Mitigation
Immediate action is required to secure your systems.
Primary Fix: Upgrade
The definitive solution is to upgrade the semantic-kernel package to version 1.39.4 or higher.
pip install --upgrade semantic-kernel>=1.39.4
Workaround If you cannot upgrade immediately, you must implement a strict workaround:
- Do not use
InMemoryVectorStorein any production environment. This component is intended for development and testing purposes only. Replace it with a persistent, production-ready vector store like Azure AI Search, PostgreSQL with thepgvectorextension, or Qdrant.
Additional Actions
- Review your applications to confirm usage of
InMemoryVectorStore. - Monitor your systems for any suspicious activity, as this vulnerability may be exploitable without leaving obvious signs.
- Ensure your development teams are aware that
InMemoryVectorStoreis not designed for production use, even after applying this security update.
By upgrading or applying the workaround, you eliminate the risk posed by this severe vulnerability.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-26030?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
Crawl4AI versions prior to 0.8.0 contain a remote code execution vulnerability in the Docker API deployment. The /crawl endpoint accepts a hooks parameter containing Python code that is executed using...
Mesa is an open-source Python library for agent-based modeling, simulating complex systems and exploring emergent behaviors. In version 3.5.0 and prior, checking out of untrusted code in benchmarks.ym...
Microsoft Devices Pricing Program Remote Code Execution Vulnerability...
pyLoad is a free and open-source download manager written in Python. From version 0.5.0b3.dev13 to 0.5.0b3.dev96, the edit_package() function implements insufficient sanitization for the pack_folder p...
Other Microsoft Vulnerabilities
Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. From 3.0.0 to before 3.1.0, if Himmelblau is deployed without a configured tenant domain in himmelblau.conf, authentica...
Microsoft Devices Pricing Program Remote Code Execution Vulnerability...