CVE-2025-32711: M365 Copilot Information Disclosure Vulnerability
Overview
- Severity
- Critical (CVSS 9.3)
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
- Category
- Information Disclosure
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2025-Jun
- Released
- 2025-06-11
- Last Updated
- 2026-02-20
- EPSS Score
- 9.91% (percentile: 93.0%)
Description
Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network.
FAQ
Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?
This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.
Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.
Detection & Weaponization (1 sources)
Maturity: Exploit
- GitHub PoC: 1 repositories
Affected Products (1)
Apps
Acknowledgments
Aim Labs (Part of Aim Security), <a href="https://x.com/es7evam">Estevam Arantes</a> with Microsoft
Revision History
- 2025-06-11: Information published.
- 2025-06-17: Added an acknowledgement. This is an informational change only.
- 2026-02-20: Updated CWE value. This is an informational change only.