CVE-2026-32196: Windows Admin Center Spoofing Vulnerability

Overview

Severity
Medium (CVSS 6.1)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C
Category
Spoofing
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2026-Apr
Released
2026-04-14

Description

Improper neutralization of input during web page generation ('cross-site scripting') in Windows Admin Center allows an unauthorized attacker to perform spoofing over a network.

FAQ

According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L), and integrity (I:L) but lead to no loss of availability (A:N). What is the impact of this vulnerability? An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality), make changes to disclosed information (Integrity), but cannot limit access to the resource (Availability). According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? This vulnerability could lead to the attacker gaining the ability to interact with other tenant’s applications and content. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker.

Affected Products (1)

Windows

  • Windows Admin Center

Security Updates (1)

Acknowledgments

<a href="https://www.linkedin.com/in/ben-zamir-401003237">Ben Zamir</a> with <a href="https://cymulate.com/">Cymulate</a>, <a href="https://www.linkedin.com/in/ilan-kalendarov-4826741a0">Ilan Kalendarov</a> with <a href="https://cymulate.com/">Cymulate</a>, <a href="https://www.linkedin.com/in/elad-beber-a17946184">Elad Beber</a> with <a href="https://cymulate.com/">Cymulate</a>, <a href="https://www.linkedin.com/in/ruben-en/">Ruben Enkaoua</a> with <a href="https://cymulate.com/">Cymulate</a>

Revision History

  • 2026-04-14: Information published.