Microsoft has addressed a high-severity vulnerability, CVE-2026-26144, in Microsoft Excel that introduces a novel and alarming attack vector for data theft. The flaw, a cross-site scripting (XSS) issue rated with a CVSS v3.1 score of 7.5, can be exploited for 'zero-click' information disclosure by abusing the integrated Microsoft Copilot AI agent. An attacker could send a specially crafted Excel file to a victim; upon opening the file, the embedded malicious script would execute and could instruct Copilot to exfiltrate sensitive data from the user's machine without requiring any further user interaction. Microsoft has released a patch in its March 9, 2026, security update and strongly recommends immediate application.
The 'zero-click' nature of this attack (post-file-open) is what makes it particularly insidious. The user does not need to click a malicious link or enable macros; simply opening the file is enough to trigger the data theft.
Customers should consult the official Microsoft security advisory for a detailed list of affected versions.
At the time of disclosure, there were no public exploits or evidence of active exploitation in the wild. However, now that the details are public, security researchers and threat actors will likely work to develop proof-of-concept exploits. Given the novelty and potential impact, it is crucial for organizations to patch before exploits become widespread.
Detecting this specific attack requires monitoring the behavior of Office applications and their network traffic:
| Type | Value | Description |
|---|---|---|
| process_name | EXCEL.EXE |
Monitor for the Excel process making unusual outbound network connections to unknown domains or IP addresses. |
| log_source | Microsoft 365 Audit Logs | Look for anomalous activity related to Copilot usage, if such logging is available. For example, Copilot accessing an unusual number of local files. |
| command_line_pattern | powershell.exe -enc |
The Excel process spawning a PowerShell process with an encoded command, a common technique for executing malicious payloads. |
EXCEL.EXE spawns suspicious child processes like powershell.exe or cmd.exe, or makes direct network connections to untrusted destinations.Apply the March 2026 security updates from Microsoft to patch the vulnerability in Excel.
Utilize Protected View for documents from untrusted sources to open them in a sandboxed environment, preventing script execution.
Use Attack Surface Reduction (ASR) rules to block risky behaviors from Office applications.
Educate users on the dangers of opening unsolicited attachments, even if they are common file types like Excel spreadsheets.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats