CVE-2026-26143
Received Received - Intake
Improper Input Validation in Microsoft PowerShell Enables Local Bypass

Publication date: 2026-04-14

Last updated on: 2026-04-27

Assigner: Microsoft Corporation

Description
Improper input validation in Microsoft PowerShell allows an unauthorized attacker to bypass a security feature locally.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-14
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
microsoft powershell From 7.4 (inc) to 7.4.14 (exc)
microsoft powershell From 7.5 (inc) to 7.5.5 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, it is recommended to apply the security updates provided by Microsoft for PowerShell as soon as they become available.

Since the vulnerability involves improper input validation allowing a local attacker to bypass security features, restricting local access to PowerShell and monitoring for unusual local activity may help reduce risk until patches are applied.


Can you explain this vulnerability to me?

This vulnerability involves improper input validation in Microsoft PowerShell. It allows an unauthorized attacker to bypass a security feature when operating locally on the affected system.


How can this vulnerability impact me? :

The vulnerability can lead to a security feature bypass, which means an attacker could circumvent protections intended to secure the system. This can result in high impact on confidentiality, integrity, and availability of the system.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in Microsoft PowerShell allows an unauthorized attacker to bypass a security feature locally due to improper input validation.

This security feature bypass could potentially impact the confidentiality, integrity, and availability of data, which are critical aspects in compliance with standards such as GDPR and HIPAA.

However, there is no specific information provided about direct effects on compliance with these regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart