Cyber Posture

CVE-2026-26149

Critical

Published: 14 April 2026

Published
14 April 2026
Modified
07 May 2026
KEV Added
Patch
CVSS Score 9.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0006 19.1th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26149 is a critical-severity Improper Neutralization of Escape, Meta, or Control Sequences (CWE-150) vulnerability in Microsoft Power Apps. Its CVSS base score is 9.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Impersonation (T1656); ranked at the 19.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Impersonation (T1656) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of inputs to neutralize escape, meta, or control sequences that enable spoofing attacks in Power Apps.

prevent

Filters information outputs to prevent rendering of harmful escape sequences leading to network-based spoofing.

prevent

Ensures timely remediation of the specific flaw in improper neutralization of control sequences in Microsoft Power Apps.

MITRE ATT&CK Enterprise TechniquesAI

T1656 Impersonation Stealth
Adversaries may impersonate a trusted person or organization in order to persuade and trick a target into performing some action on their behalf.
T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Why these techniques?

CVE enables network spoofing via escape sequence injection in Power Apps (CWE-150), directly facilitating impersonation of users/content (T1656) and adversary-in-the-middle style deception (T1557) with scope change and high CIA impact.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper neutralization of escape, meta, or control sequences in Microsoft Power Apps allows an authorized attacker to perform spoofing over a network.

Deeper analysisAI

CVE-2026-26149 is a vulnerability in Microsoft Power Apps stemming from improper neutralization of escape, meta, or control sequences. Published on 2026-04-14, it enables an authorized attacker to perform spoofing over a network and is associated with CWE-150. The issue carries a CVSS v3.1 base score of 9.0 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H), classifying it as critical due to its potential for high-impact effects across confidentiality, integrity, and availability.

Exploitation requires an attacker with low privileges, such as an authenticated user, to target victims over the network with low complexity, though user interaction is necessary. Upon success, the attack changes scope and allows spoofing, leading to high confidentiality, integrity, and availability impacts as scored by CVSS.

The Microsoft Security Response Center advisory provides details on mitigation at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26149.

Details

CWE(s)

Affected Products

microsoft
power apps
≤ 3.26032.10.0

CVEs Like This One

CVE-2026-32172Same product: Microsoft Power Apps
CVE-2026-20960Same product: Microsoft Power Apps
CVE-2025-24071Same vendor: Microsoft
CVE-2026-21521Same vendor: Microsoft
CVE-2026-21260Same vendor: Microsoft
CVE-2025-24054Same vendor: Microsoft
CVE-2025-33054Same vendor: Microsoft
CVE-2026-26151Same vendor: Microsoft
CVE-2026-20947Same vendor: Microsoft
CVE-2026-20856Same vendor: Microsoft

References