CVE-2026-26030 is a Remote Code Execution vulnerability that has been identified in Microsoft Semantic Kernel Python SDK, specifically within the InMemoryVectorStore filter functionality. GitHub created this CVE on their behalf. GitHub created this CVE on their behalf. This document incorporates updates in the Microsoft Semantic Kernel Repository which address this vulnerability. Please see CVE-2026-26030 for more information.
According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. How could an attacker exploit this vulnerability? An attacker would need to reach an application that uses the vulnerable Semantic Kernel Python SDK and allows users to submit filter strings (for example, as part of search or query options) over the network. By sending a specially crafted filter value to such an application, the attacker could cause their code to run on the server with the application’s permissions, without needing to sign in or rely on any action from another user, provided this functionality is exposed to untrusted input.
Maturity: Exploit
<a href="https://www.linkedin.com/in/eran-shimony/">Eran Shimony</a> with <a href="https://www.cyberark.com/resources/threat-research-blog">Cyberark</a>, Dor Edry with Microsoft, Amit Eliahu with Microsoft, <a href="https://www.linkedin.com/in/crstaicu/">Cris Staicu</a> with <a href="https://www.endorlabs.com/">Endor Labs</a>, <a href="https://x.com/daridor">Dan Aridor</a> with <a href="https://sprk3.com/">Dan Aridor Holdings LTD</a>, <a href="https://github.com/ka7arotto">ZhangXupeng</a>, <a href="https://www.linkedin.com/in/deniz-güney-yıldırım-09a23b150/">Deniz Güney Yıldırım</a>, <a href="https://x.com/security_index">Yoshizawa</a>