Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2026-26030

Опубликовано: 12 мар. 2026
Источник: msrc
CVSS3: 9.9
EPSS Низкий

Описание

GitHub: CVE-2026-26030 Microsoft Semantic Kernel InMemoryVectorStore filter functionality vulnerable

CVE-2026-26030 is a Remote Code Execution vulnerability that has been identified in Microsoft Semantic Kernel Python SDK, specifically within the InMemoryVectorStore filter functionality. GitHub created this CVE on their behalf. GitHub created this CVE on their behalf. This document incorporates updates in the Microsoft Semantic Kernel Repository which address this vulnerability.

Please see CVE-2026-26030 for more information.

Обходное решение

The following has been identified as a workaround for this vulnerability.

Avoid using

InMemoryVectorStore

for production scenarios.

FAQ

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities.

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.

How could an attacker exploit this vulnerability?

An attacker would need to reach an application that uses the vulnerable Semantic Kernel Python SDK and allows users to submit filter strings (for example, as part of search or query options) over the network. By sending a specially crafted filter value to such an application, the attacker could cause their code to run on the server with the application’s permissions, without needing to sign in or rely on any action from another user, provided this functionality is exposed to untrusted input.

Обновления

ПродуктСтатьяОбновление
Microsoft Semantic Kernel Python SDK

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Unlikely

EPSS

Процентиль: 25%
0.00089
Низкий

9.9 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.9
nvd
около 1 месяца назад

Semantic Kernel, Microsoft's semantic kernel Python SDK, has a remote code execution vulnerability in versions prior to 1.39.4, specifically within the `InMemoryVectorStore` filter functionality. The problem has been fixed in version `python-1.39.4`. Users should upgrade this version or higher. As a workaround, avoid using `InMemoryVectorStore` for production scenarios.

CVSS3: 9.9
github
около 1 месяца назад

Microsoft Semantic Kernel InMemoryVectorStore filter functionality vulnerable to remote code execution

EPSS

Процентиль: 25%
0.00089
Низкий

9.9 Critical

CVSS3