Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft 365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data

Posted on October 21, 2025October 22, 2025 By CWS

A classy vulnerability in Microsoft 365 Copilot (M365 Copilot) that permits attackers to steal delicate tenant information, together with current emails, by way of oblique immediate injection assaults.

The flaw, detailed in a weblog publish revealed right this moment by researcher Adam Logue, exploits the AI assistant’s integration with Workplace paperwork and its built-in help for Mermaid diagrams, enabling information exfiltration with out direct person interplay past an preliminary click on.

The assault begins when a person asks M365 Copilot to summarize a maliciously crafted Excel spreadsheet. Hidden directions, embedded in white textual content throughout a number of sheets, use progressive process modification and nested instructions to hijack the AI’s habits.

These oblique prompts override the summarization process, directing Copilot to invoke its search_enterprise_emails software to retrieve current company emails. The fetched content material is then hex-encoded and fragmented into brief traces to bypass Mermaid’s character limits.

Microsoft 365 Copilot Information Exfiltration Through Misleading Diagrams

Copilot generates a Mermaid diagram, a JavaScript-based software for creating flowcharts and charts from Markdown-like textual content that masquerades as a “login button” secured with a lock emoji.

The diagram consists of CSS styling for a convincing button look and a hyperlink embedding the encoded e-mail information.

When the person clicks it, believing it’s wanted to entry the doc’s “delicate” content material, the hyperlink directs to the attacker’s server, reminiscent of a Burp Collaborator occasion. The hex-encoded payload transmits silently, the place it may be decoded from server logs.

Mermaid’s flexibility, together with CSS help for hyperlinks, made this vector notably insidious. Not like direct immediate injection, the place attackers converse with the AI, this methodology hides instructions in benign recordsdata like emails or PDFs, making it stealthy for phishing campaigns.

Adam Logue famous similarities to a previous Mermaid exploit in Cursor IDE, which enabled zero-click exfiltration through distant photographs, although M365 Copilot required person interplay.

The payload, after intensive testing, was impressed by Microsoft’s TaskTracker analysis on detecting “process drift” in LLMs. Regardless of preliminary challenges reproducing the problem, Microsoft validated the chain and patched it by September 2025, eradicating interactive hyperlinks from Copilot’s rendered Mermaid diagrams.

The invention timeline reveals that there have been challenges in coordination. Adam Logue reported the entire state of affairs on August 15, 2025, after discussions with the Microsoft Safety Response Middle (MSRC) workers at DEFCON.

After iterations, together with video proofs, MSRC confirmed the vulnerability on September 8 and resolved it by September 26. Nevertheless, M365 Copilot fell outdoors the bounty scope, denying a reward.

This incident underscores dangers in AI software integrations, particularly for enterprise environments dealing with delicate information. As LLMs like Copilot hook up with APIs and inside sources, defenses in opposition to oblique injections stay essential.

Microsoft emphasised ongoing mitigations, however consultants urge customers to confirm doc sources and monitor AI outputs carefully.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Copilot, Data, Exfiltrate, Injection, Microsoft, Prompt, Sensitive, Vulnerability

Post navigation

Previous Post: PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign
Next Post: Better Auth API keys Vulnerability Let Attackers Create Privileged Credentials For Arbitrary Users

Related Posts

Cyber Attacks Targeting Education Sector Surges Following Back-to-School Season Cyber Security News
Google’s Salesforce Instances Hacked in Ongoing Attack Cyber Security News
PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication Cyber Security News
Lionishackers Threat Actors Exfiltrating and Selling Corporate Databases on Dark Web Cyber Security News
North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging Cyber Security News
Gemini CLI Vulnerability Allows Hackers to Execute Malicious Commands on Developer Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Aim at European Drone Companies
  • In Other News: iOS 26 Deletes Spyware Evidence, Shadow Escape Attack, Cyber Exec Sold Secrets to Russia
  • Toys ‘R’ Us Canada Customer Information Leaked Online
  • Hackers Exploited 73 0-Day Vulnerabilities and Earned $1,024,750
  • New PhantomCaptcha RAT Weaponized PDFs to Deliver Malware Using ‘ClickFix’-Style Cloudflare Captcha Pages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Aim at European Drone Companies
  • In Other News: iOS 26 Deletes Spyware Evidence, Shadow Escape Attack, Cyber Exec Sold Secrets to Russia
  • Toys ‘R’ Us Canada Customer Information Leaked Online
  • Hackers Exploited 73 0-Day Vulnerabilities and Earned $1,024,750
  • New PhantomCaptcha RAT Weaponized PDFs to Deliver Malware Using ‘ClickFix’-Style Cloudflare Captcha Pages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News