Improper control of generation of code ('code injection') in Microsoft Data Formulator allows an unauthorized attacker to execute code over a network.
History

Wed, 13 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft data Formulator
Vendors & Products Microsoft data Formulator

Tue, 12 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description Improper control of generation of code ('code injection') in Microsoft Data Formulator allows an unauthorized attacker to execute code over a network.
Title Microsoft Data Formulator Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft data Formulator
Weaknesses CWE-94
CPEs cpe:2.3:a:microsoft:data_Formulator:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft data Formulator
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-05-13T17:58:44.953Z

Reserved: 2026-04-16T19:12:36.195Z

Link: CVE-2026-41094

cve-icon Vulnrichment

Updated: 2026-05-13T10:00:36.419Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-12T18:17:20.890

Modified: 2026-05-13T15:34:52.573

Link: CVE-2026-41094

cve-icon Redhat

No data.