Home Microsoft CVE-2026-26144
Back to Microsoft

CVE-2026-26144

Microsoft Office Excel

Microsoft CVSS 7.5 Updated March 15, 2026

Executive Risk Summary

"An unauthorized attacker can exploit a cross-site scripting vulnerability in Microsoft Office Excel to disclose information over a network. This vulnerability is due to improper neutralization of input during web page generation and can be used to gain unauthorized access to sensitive data."

Operational Audit Arsenal

Target Type Executable
Target Asset EXCEL.EXE
Standard Path %ProgramFiles%Microsoft Office\rootOffice16
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: EXCEL.EXE (Executable)
$Targets = 'EXCEL.EXE'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

Microsoft Office Excel service affected

Internal Work Notes

CVE-2026-26144: Microsoft Office Excel cross-site scripting vulnerability - apply latest security patch to prevent unauthorized information disclosure

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Microsoft Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.