Microsoft has issued an emergency advisory for Copilot for Microsoft 365 enterprise customers after discovering a prompt injection vulnerability that could allow unauthorized data extraction from SharePoint and OneDrive through crafted document content.

Vulnerability Details

The flaw allows an attacker to embed hidden instructions in shared documents that Copilot processes, potentially causing it to summarize and exfiltrate sensitive data from the user's accessible files.

Mitigation

Microsoft has deployed a server-side fix that adds input sanitization to Copilot's document processing pipeline. Enterprise admins are advised to audit Copilot activity logs for the past 30 days and review any external document sharing that occurred during the exposure window. The incident highlights growing concerns about AI assistant security in enterprise environments.