EchoLeak Strikes: Microsoft 365 Copilot’s Vulnerability Exposed Before Patch
Microsoft 365 Copilot was exposed to the EchoLeak attack, a zero-click AI command injection vulnerability. Without user interaction, threat actors could steal sensitive data using crafted emails. Microsoft has patched the flaw, tracked as CVE-2025-32711, but the incident highlights AI’s potential risks. Aim Security warns similar attacks might target other AI applications.

Hot Take:
Well, it looks like Microsoft 365 Copilot had a bit of a party crasher in the form of EchoLeak. While most of us were blissfully unaware, our trusty AI sidekick almost turned into a blabbermouth, spilling the beans on our secrets faster than you can say “critical vulnerability”. But fear not, because Microsoft swooped in like a superhero to patch things up, saving the day and our precious data. So, rest easy and let Copilot get back to its day job of organizing your life, minus the uninvited guests!
Key Points:
- EchoLeak: A zero-click vulnerability in Microsoft 365 Copilot known as CVE-2025-32711.
- The attack involves AI command injection and can exfiltrate sensitive information without user interaction.
- Microsoft has already patched the vulnerability on their server side, requiring no action from users.
- The attack was executed by sending crafted emails that instructed Copilot to leak information.
- EchoLeak demonstrates a potential threat to other AI applications beyond just Microsoft’s Copilot.