<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Data Formulator — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/data-formulator/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 18:51:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/data-formulator/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-41094: Microsoft Data Formulator Code Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-41094-data-formulator-code-injection/</link><pubDate>Tue, 12 May 2026 18:51:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-41094-data-formulator-code-injection/</guid><description>CVE-2026-41094 is a code injection vulnerability in Microsoft Data Formulator, allowing an unauthorized attacker to execute arbitrary code over a network.</description><content:encoded><![CDATA[<p>CVE-2026-41094 is a code injection vulnerability affecting Microsoft Data Formulator. According to the NVD and Microsoft&rsquo;s advisory, an unauthorized attacker can exploit this vulnerability to execute arbitrary code over a network. The vulnerability stems from improper control of code generation within the Data Formulator. Successful exploitation requires network access to the vulnerable Data Formulator instance. Given the high CVSS score (8.8), this vulnerability poses a significant risk, potentially allowing attackers to gain control of affected systems and networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable instance of Microsoft Data Formulator accessible over the network.</li>
<li>The attacker crafts a malicious request containing injected code. This could involve manipulating input fields or parameters processed by the Data Formulator.</li>
<li>The malicious request is sent to the vulnerable Data Formulator instance.</li>
<li>The Data Formulator processes the malicious request, improperly generating code based on the attacker-supplied input.</li>
<li>The injected code is executed within the context of the Data Formulator application.</li>
<li>Depending on the injected code, the attacker can achieve various objectives, such as executing system commands, accessing sensitive data, or establishing a persistent backdoor.</li>
<li>The attacker leverages the executed code to move laterally within the network, potentially compromising other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41094 allows an attacker to execute arbitrary code on systems running Microsoft Data Formulator. The vulnerability has a CVSS v3.1 score of 8.8, indicating a high severity. This can lead to complete system compromise, data breaches, and potential lateral movement within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-41094 as soon as possible; reference the advisory URL in the references section.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Data Formulator Code Injection&rdquo; to your SIEM to identify potential exploitation attempts based on web requests.</li>
<li>Monitor network traffic for suspicious activity targeting Microsoft Data Formulator instances.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>code-injection</category><category>cve</category></item></channel></rss>