Microsoft Purview SSRF elevates privileges (CVE-2026-26150)
CVE-2026-26150
Unauthenticated attackers exploit CVE-2026-26150 SSRF in Microsoft Purview to access internal resources and elevate privileges. Apply the April 2026 security update to block exploitation.
Vendor-confirmed - CVE-2026-26150 is a high SSRF in Microsoft Purview prior to the April 2026 security update that grants unauthenticated attackers access to internal network resources and privilege elevation with minimal complexity.
Overview
Unauthenticated attackers can exploit a server-side request forgery (SSRF) vulnerability in Microsoft Purview to elevate privileges over the network, with no user interaction required. This flaw, tracked as CVE-2026-26150, carries a CVSS score of 8.6 (HIGH) due to its low attack complexity and the absence of authentication requirements.
Vulnerability Details
The vulnerability exists in how Microsoft Purview handles incoming network requests. By sending specially crafted requests to the Purview service, an unauthenticated attacker can trick the server into making requests to internal resources that should be restricted. This SSRF condition enables the attacker to interact with internal services, potentially accessing sensitive data or performing actions that require elevated privileges.
Impact
An attacker who successfully exploits CVE-2026-26150 can:
- Access internal network resources that are normally unreachable from the internet
- Potentially read sensitive configuration files or credentials from internal systems
- Elevate their privileges within the Microsoft Purview environment
- Use the compromised service to pivot to other internal systems
The CVSS vector (AV:N/AC:L/PR:N/UI:N) confirms this is a network-accessible vulnerability requiring no special access conditions, making it attractive to opportunistic attackers.
Affected Systems
Microsoft Purview deployments using versions prior to the security update released for this CVE are affected. Organizations using Microsoft Purview for data governance and compliance should verify their installation version against Microsoft’s advisory.
Remediation
The immediate and recommended action is to apply Microsoft’s security update for this vulnerability. There are no known workarounds that fully address the SSRF risk.
- Review the Microsoft Security Response Center advisory for CVE-2026-26150
- Deploy the update to all Microsoft Purview instances
- Monitor network logs for unusual outbound requests from Purview services, which may indicate exploitation attempts
Security Insight
This SSRF in Microsoft Purview follows a pattern seen in other cloud-based data governance platforms where internal API calls are insufficiently validated. Organizations should treat SSRF vulnerabilities in SaaS services seriously because they bypass the perimeter security model entirely. The lack of required authentication for this flaw is particularly concerning, as it mirrors the attack profile seen in recent campaigns targeting cloud infrastructure.
For related threat intelligence, review our coverage of APT28 DNS hijacking tactics and campaigns using SOHO router compromises to understand how SSRF vulnerabilities fit into broader adversary operations.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, FastGPT's MCP (Model Context Protocol) tools endpoints (/api/core/app/mcpTools/getTools and /api/core/app/mcpTools/runTool) accept ...
OpenClaw before 2026.3.28 contains a server-side request forgery vulnerability in the fal provider image-generation-provider.ts component that allows attackers to fetch internal URLs. A malicious or c...
A vulnerability was identified in elecV2 elecV2P up to 3.8.3. This affects the function eAxios of the file /mock of the component URL Handler. Such manipulation of the argument req leads to server-sid...
PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. Prior to version 0.7.7, a Server-Side Request Forgery (SSRF) vulnerability in the /download endpoint all...