PT-2025-25212 · Microsoft · M365 Copilot
Es7Evam
+1
·
Published
2025-06-11
·
Updated
2026-03-26
·
CVE-2025-32711
CVSS v3.1
9.3
Critical
| AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
Microsoft 365 Copilot versions prior to the fix released in May 2025
Description
A zero-click AI command injection issue, identified as EchoLeak (CVE-2025-32711), affects Microsoft 365 Copilot. This flaw allows an unauthorized attacker to disclose information over a network without any user interaction. The vulnerability exploits a lack of isolation between trust boundaries within Copilot, enabling malicious prompts embedded in emails to exfiltrate sensitive data. The attack leverages prompt injection, automatic tool invocation, and techniques like CSP bypass and ASCII smuggling. Researchers at Aim Labs discovered the vulnerability in January 2025 and reported it to Microsoft, who subsequently addressed it server-side in May 2025. This is the first known zero-click attack targeting agentic AI systems.
Recommendations
Ensure Microsoft 365 Copilot is updated to the version released in May 2025 or later to address this vulnerability.
Fix
RCE
Command Injection
Special Elements Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
M365 Copilot