← Back to feed

Microsoft Semantic Kernel CVE-2026-26030: Prompt Injection to RCE in Agentic AI Frameworks—Eval() Filter Bypasses Enable Code Execution Chains

Date: 2026-05-12
Tags: prompt-injection, mcp-security, malicious-tool

Executive Summary

Microsoft discovered a vulnerable path in Semantic Kernel that could turn prompt injection into host-level remote code execution (RCE). A single prompt was enough to launch calc.exe on the device running an AI agent, with no browser exploit, malicious attachment, or memory corruption bug needed. Microsoft identified and disclosed two critical vulnerabilities: CVE-2026-25592 and CVE-2026-26030, which have since been fixed and could allow an attacker to achieve unauthorized code execution by leveraging injection attacks specifically targeted at agents built within the framework. Your agent is vulnerable to CVE-2026-26030 if it uses the Python package semantic-kernel running a framework version prior to 1.39.4.

Campaign Summary

FieldDetail
Campaign / MalwareSemantic Kernel Prompt Injection RCE Exploitation (Proof-of-Concept/Vulnerability)
AttributionMicrosoft Security Research; vulnerability disclosure (confidence: high)
TargetEnterprises running AI agents built on Microsoft Semantic Kernel (27,000+ GitHub stars); developers integrating Semantic Kernel with tool-calling and RAG systems
VectorPrompt injection via crafted LLM responses designed to manipulate agent tool-calling behavior; eval() filter bypass via Python AST-traversal payloads
Statuspatched
First Observed2026-05-07

Detailed Findings

Exploitation of this vulnerability requires two conditions: the attacker must have a prompt injection vector allowing influence over the agent's inputs, and the targeted agent must have the Search Plugin backed by In-Memory Vector Store functionality using the default configuration. The attack requires crafting a prompt injection that not only bypasses the agent's natural language defenses but also smuggles a Python AST-traversal payload through the vulnerable eval() sink. Security teams must correlate signals across two layers: the AI model level (intent detection through meta prompts and content safety filters) and the host level (execution detection). If an attacker bypasses the AI model guardrails, traditional endpoint defense must be in place to detect anomalous behavior, such as an AI agent process suddenly spawning command lines or dropping scripts into Startup folders.

MITRE ATT&CK Mapping

TechniqueIDContext
Prompt InjectionT1593Attacker crafts malicious prompts to manipulate LLM behavior and agent tool selection
Exploitation of Software VulnerabilityT1190Unsafe eval() function in Python SDK allows AST-traversal payload execution
Remote Code ExecutionT1059Arbitrary command execution on the system running the AI agent process
Defense Evasion via ObfuscationT1027Python AST manipulation to evade input validation and filter bypasses

IOCs

Domains

_Vulnerability affects semantic-kernel Python SDK versions prior to 1.39.4. Microsoft has released patches. No active exploitation campaigns reported in the wild; this is primarily a designer flaw with proof-of-concept demonstration._

Full URL Paths

_Vulnerability affects semantic-kernel Python SDK versions prior to 1.39.4. Microsoft has released patches. No active exploitation campaigns reported in the wild; this is primarily a designer flaw with proof-of-concept demonstration._

Splunk Format

_No IOCs available for Splunk query_

Package Indicators

semantic-kernel<1.39.4 (Python SDK)

Detection Recommendations

Upgrade semantic-kernel to version 1.39.4 or later immediately; implement host-level endpoint detection and response (EDR) to monitor for unexpected process spawning from AI agent processes; log all LLM interactions and tool calls to identify anomalous patterns; use input validation schemas to enforce type safety for all agent tool parameters; implement code execution guardrails that require human approval for sensitive operations; scan for CVE-2026-26030 in your Semantic Kernel deployments using dependency scanning tools.

References