Microsoft Power Apps Vulnerability Allows Remote Code Execution

Microsoft Power Apps Vulnerability Allows Remote Code Execution

The National Vulnerability Database has disclosed CVE-2026-32172, a high-severity vulnerability in Microsoft Power Apps. This uncontrolled search path element flaw carries a CVSS v3.1 score of 8.0, indicating a significant risk. An unauthorized attacker could exploit this over a network to achieve code execution.

This isn’t a theoretical issue; it’s a critical design flaw (CWE-427) that allows an attacker to dictate where the application looks for executable components. While Microsoft Power Apps is designed to simplify application development, this vulnerability exposes organizations to a fundamental compromise of system integrity. The vector is AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N, meaning it’s network-exploitable, but requires user interaction and high attack complexity. However, the impact on confidentiality and integrity is high.

For defenders, the implication is clear: if an attacker can manipulate the search path, they can trick the application into executing malicious code instead of legitimate binaries. This is a classic method for privilege escalation and persistence. While specific affected products aren’t detailed by the National Vulnerability Database, any organization leveraging Microsoft Power Apps should assume exposure until Microsoft provides specific guidance and patches.

What This Means For You

  • If your organization utilizes Microsoft Power Apps, you need to understand the implications of CVE-2026-32172. This isn't just a denial-of-service; it's remote code execution. Monitor Microsoft's advisories for Power Apps closely for patches or mitigation steps. Review your Power Apps deployments for any non-standard configurations that might exacerbate this uncontrolled search path vulnerability.
🛡️ Am I exposed to this? Get detection rules for CVE-2026-32172 — Splunk, Sentinel, Elastic, QRadar & more

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

CVE-2026-32172 - Microsoft Power Apps Uncontrolled Search Path Element RCE

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-32172 RCE Microsoft Power Apps
CVE-2026-32172 RCE Uncontrolled search path element
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 24, 2026 at 01:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-6732 — Libxml2 Denial of Service

CVE-2026-6732 — A flaw was found in libxml2. This vulnerability occurs when the library processes a specially crafted XML Schema Definition (XSD) validated document that...

vulnerabilityCVEmedium-severitydenial-of-servicecwe-843
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma

OpenShell Mirror Mode Allows Arbitrary Code Execution

CVE-2026-41355 — OpenShell before 2026.3.28 contains an arbitrary code execution vulnerability in mirror mode that converts untrusted sandbox files into workspace hooks. Attackers with mirror...

vulnerabilityCVEhigh-severitycode-executioncwe-829
/SCW Vulnerability Desk /HIGH /7.3 /⚑ 4 IOCs /⚙ 3 Sigma

OpenClaw: High-Severity Access Control Bypass Looms

CVE-2026-41353 — OpenClaw before 2026.3.22 contains an access control bypass vulnerability in the allowProfiles feature that allows attackers to circumvent profile restrictions through persistent profile...

vulnerabilityCVEhigh-severitycwe-472
/SCW Vulnerability Desk /HIGH /8.1 /⚑ 4 IOCs /⚙ 2 Sigma