New Excel Flaw Allows Zero-Click Data Theft by Abusing Copilot AI

Microsoft Patches High-Severity Excel Flaw (CVE-2026-26144) Enabling Zero-Click Data Theft via Copilot

HIGH
March 9, 2026
5m read
VulnerabilityMalwareCloud Security

Related Entities

Organizations

Products & Tech

Microsoft Excel Microsoft Copilot

CVE Identifiers

CVE-2026-26144
HIGH
CVSS:7.5

Full Report

Executive Summary

Microsoft has addressed a high-severity vulnerability, CVE-2026-26144, in Microsoft Excel that introduces a novel and alarming attack vector for data theft. The flaw, a cross-site scripting (XSS) issue rated with a CVSS v3.1 score of 7.5, can be exploited for 'zero-click' information disclosure by abusing the integrated Microsoft Copilot AI agent. An attacker could send a specially crafted Excel file to a victim; upon opening the file, the embedded malicious script would execute and could instruct Copilot to exfiltrate sensitive data from the user's machine without requiring any further user interaction. Microsoft has released a patch in its March 9, 2026, security update and strongly recommends immediate application.

Vulnerability Details

  • CVE ID: CVE-2026-26144
  • CVSS Score: 7.5 (High)
  • Description: A cross-site scripting (XSS) vulnerability in Microsoft Excel.
  • Root Cause: The vulnerability exists because Excel fails to properly sanitize user-provided input when generating web content for features that interact with web-based components, such as Copilot.
  • Attack Vector: An attacker crafts a malicious Excel spreadsheet containing a hidden script. When a user opens this file, the script is executed in a context that can interact with the Copilot AI agent. The script can then issue commands to Copilot, potentially instructing it to access local files or data and exfiltrate them to an attacker-controlled location.

The 'zero-click' nature of this attack (post-file-open) is what makes it particularly insidious. The user does not need to click a malicious link or enable macros; simply opening the file is enough to trigger the data theft.

Affected Systems

  • Product: Microsoft Office Excel (all versions with Microsoft Copilot integration).
  • Platform: Microsoft 365 and potentially other versions where Copilot features are enabled.

Customers should consult the official Microsoft security advisory for a detailed list of affected versions.

Exploitation Status

At the time of disclosure, there were no public exploits or evidence of active exploitation in the wild. However, now that the details are public, security researchers and threat actors will likely work to develop proof-of-concept exploits. Given the novelty and potential impact, it is crucial for organizations to patch before exploits become widespread.

Impact Assessment

  • Information Disclosure: The primary impact is the theft of sensitive information. The exploit could be used to steal data from the opened document itself, other documents on the user's machine, or other data accessible to the user's account.
  • Business Email Compromise (BEC): If an attacker can steal session tokens or credentials stored locally, they could use them to access the user's email account and launch BEC attacks.
  • Corporate Espionage: The flaw could be used in targeted attacks to steal intellectual property, financial projections, or other confidential corporate data stored in spreadsheets.
  • Erosion of Trust in AI Assistants: This vulnerability highlights a new class of threats where AI agents, designed to be helpful, are turned into malicious actors. This could damage user trust in integrated AI technologies.

Cyber Observables for Detection

Detecting this specific attack requires monitoring the behavior of Office applications and their network traffic:

Type Value Description
process_name EXCEL.EXE Monitor for the Excel process making unusual outbound network connections to unknown domains or IP addresses.
log_source Microsoft 365 Audit Logs Look for anomalous activity related to Copilot usage, if such logging is available. For example, Copilot accessing an unusual number of local files.
command_line_pattern powershell.exe -enc The Excel process spawning a PowerShell process with an encoded command, a common technique for executing malicious payloads.

Detection Methods

  1. Endpoint Detection and Response (EDR): Use an EDR solution to monitor process relationships. An alert should be triggered if EXCEL.EXE spawns suspicious child processes like powershell.exe or cmd.exe, or makes direct network connections to untrusted destinations.
  2. Network Monitoring: Analyze egress network traffic from endpoints. Use a proxy or firewall to inspect and block suspicious traffic from Office applications. This is an application of Outbound Traffic Filtering (D3-OTF).
  3. Application Hardening: Use Attack Surface Reduction (ASR) rules in Microsoft Defender to block Office applications from creating child processes or injecting code into other processes.

Remediation Steps

  1. Apply March 2026 Patches: The most critical step is to deploy the March 9, 2026, security updates from Microsoft across all systems running vulnerable versions of Excel. This is a direct application of D3FEND's Software Update (D3-SU).
  2. Enable Protected View: Ensure that 'Protected View' is enabled for files originating from the internet. This feature opens documents in a sandboxed, read-only mode, which can prevent many exploits from running automatically.
  3. User Education: Remind users to be extremely cautious about opening unsolicited Excel files, even if they appear to come from a trusted source. Phishing is the most likely delivery mechanism for a malicious file.
  4. Review Copilot Usage Policies: For organizations using Copilot, review and consider restricting its capabilities if possible, especially regarding its access to local data, until the security implications are better understood.

Timeline of Events

1
March 9, 2026
Microsoft discloses and releases patches for CVE-2026-26144 as part of its security updates.
2
March 9, 2026
This article was published

MITRE ATT&CK Mitigations

Apply the March 2026 security updates from Microsoft to patch the vulnerability in Excel.

Utilize Protected View for documents from untrusted sources to open them in a sandboxed environment, preventing script execution.

Use Attack Surface Reduction (ASR) rules to block risky behaviors from Office applications.

Educate users on the dangers of opening unsolicited attachments, even if they are common file types like Excel spreadsheets.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

VulnerabilityMicrosoft ExcelCopilotXSSZero-ClickData Theft

📢 Share This Article

Help others stay informed about cybersecurity threats