CVE-2026-26143
Improper Input Validation in Microsoft PowerShell Enables Local Bypass
Publication date: 2026-04-14
Last updated on: 2026-04-27
Assigner: Microsoft Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | powershell | From 7.4 (inc) to 7.4.14 (exc) |
| microsoft | powershell | From 7.5 (inc) to 7.5.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, it is recommended to apply the security updates provided by Microsoft for PowerShell as soon as they become available.
Since the vulnerability involves improper input validation allowing a local attacker to bypass security features, restricting local access to PowerShell and monitoring for unusual local activity may help reduce risk until patches are applied.
Can you explain this vulnerability to me?
This vulnerability involves improper input validation in Microsoft PowerShell. It allows an unauthorized attacker to bypass a security feature when operating locally on the affected system.
How can this vulnerability impact me? :
The vulnerability can lead to a security feature bypass, which means an attacker could circumvent protections intended to secure the system. This can result in high impact on confidentiality, integrity, and availability of the system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in Microsoft PowerShell allows an unauthorized attacker to bypass a security feature locally due to improper input validation.
This security feature bypass could potentially impact the confidentiality, integrity, and availability of data, which are critical aspects in compliance with standards such as GDPR and HIPAA.
However, there is no specific information provided about direct effects on compliance with these regulations.