Improper input validation in Power BI allows an authorized attacker to execute code over a network.
History

Thu, 26 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description Improper input validation in Power BI allows an authorized attacker to execute code over a network.
Title Power BI Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft power Bi Report Server
Weaknesses CWE-20
CPEs cpe:2.3:a:microsoft:power_bi_report_server:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft power Bi Report Server
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published: 2026-02-10T17:51:25.595Z

Updated: 2026-02-27T20:54:58.989Z

Reserved: 2025-12-11T21:02:05.734Z

Link: CVE-2026-21229

cve-icon Vulnrichment

Updated: 2026-02-25T15:43:18.625Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T18:16:23.453

Modified: 2026-02-11T21:15:13.490

Link: CVE-2026-21229

cve-icon Redhat

No data.