Home Microsoft CVE-2026-25592
Back to Microsoft

CVE-2026-25592

Microsoft Semantic Kernel - .NET SDK

Microsoft CVSS 9.9 Updated March 15, 2026

Executive Risk Summary

"An Arbitrary File Write vulnerability has been identified in Microsoft's Semantic Kernel .NET SDK, specifically within the SessionsPythonPlugin, which could allow an attacker to write files to arbitrary locations on the system. The issue has been fixed in Microsoft.SemanticKernel.Core version 1.71.0, and users can create a Function Invocation Filter as a mitigation."

Operational Audit Arsenal

Target Type DLL
Target Asset Microsoft.SemanticKernel.Core
Standard Path %windir%\Microsoft.NET\assembly\GAC_MSIL\Microsoft.SemanticKernel.Core
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Microsoft.SemanticKernel.Core (DLL)
$Targets = 'Microsoft.SemanticKernel.Core'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Unlikely

Low to Moderate

Internal Work Notes

Apply Microsoft.SemanticKernel.Core version 1.71.0 to mitigate Arbitrary File Write vulnerability in Semantic Kernel .NET SDK

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Microsoft Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.