M365 Copilot Critical Open Redirect Allows Privilege Escalation
The National Vulnerability Database has disclosed CVE-2026-33102, a critical open redirect vulnerability in M365 Copilot. This flaw, rated with a CVSS score of 9.3, allows an unauthorized attacker to elevate privileges over a network. The root cause is identified as CWE-601, a classic URL redirection to an untrusted site.
This isn’t just about phishing; an attacker can craft malicious links that appear legitimate, leveraging the trusted M365 domain to redirect users to attacker-controlled sites. From there, it’s a straight shot to credential harvesting, session hijacking, or delivering drive-by downloads. The ‘elevation of privilege’ aspect means this isn’t merely a client-side annoyance; it could lead to broader network compromise if exploited successfully.
While specific affected products beyond ‘M365 Copilot’ are not detailed by the National Vulnerability Database, organizations deploying or planning to deploy Copilot should prioritize understanding the implications. This type of vulnerability is often leveraged as a stepping stone in more complex attack chains, making it a critical concern for defenders.
What This Means For You
- If your organization uses M365 Copilot, understand that this critical open redirect (CVE-2026-33102) can be used for privilege escalation. Immediately review Microsoft's official security advisories and apply any available patches or mitigations. Educate your users on identifying suspicious links, even those appearing to originate from trusted domains.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
M365 Copilot Open Redirect to Malicious Site - CVE-2026-33102
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-33102 | Open Redirect | M365 Copilot |
| CVE-2026-33102 | Privilege Escalation | M365 Copilot |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 24, 2026 at 01:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.