<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Semantic-Kernel — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/semantic-kernel/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 20:22:39 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/semantic-kernel/feed.xml" rel="self" type="application/rss+xml"/><item><title>AI Agent Frameworks Vulnerable to RCE via Prompt Injection</title><link>https://feed.craftedsignal.io/briefs/2026-05-ai-agent-rce/</link><pubDate>Thu, 07 May 2026 20:22:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-ai-agent-rce/</guid><description>AI agents using frameworks like Microsoft's Semantic Kernel are vulnerable to remote code execution (RCE) via prompt injection by manipulating plugin parameters due to unsafe data handling.</description><content:encoded><![CDATA[<p>AI agents, enhanced with plugins in frameworks like Semantic Kernel, now actively operate on networks, creating execution risks beyond content issues. This research highlights vulnerabilities (CVE-2026-26030, CVE-2026-25592) in Microsoft&rsquo;s Semantic Kernel, which could turn prompt injection into remote code execution (RCE). A single, crafted prompt can trigger unauthorized code execution, like launching calc.exe, on the host system without traditional exploits. The AI model correctly parses language into tool schemas; however, the framework&rsquo;s trust in this parsed data creates vulnerabilities. This post details the identified vulnerabilities in Semantic Kernel, mitigation steps, and ways to assess potential exposure and investigate possible exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an AI agent using a vulnerable framework like Semantic Kernel.</li>
<li>The agent has a search plugin backed by an In-Memory Vector Store.</li>
<li>The attacker injects malicious code into a prompt, exploiting a prompt injection vulnerability.</li>
<li>The AI model parses the injected prompt and passes the malicious payload to the search plugin.</li>
<li>The search plugin&rsquo;s filter function, which uses unsafe string interpolation, incorporates the malicious code into an <code>eval()</code> statement.</li>
<li>The <code>eval()</code> statement executes the injected code, achieving arbitrary code execution on the host.</li>
<li>The attacker gains control of the system running the AI agent.</li>
<li>The attacker can perform malicious actions such as data exfiltration, lateral movement, or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to unauthorized code execution on systems running AI agents. This can result in data breaches, system compromise, and further malicious activities. Vulnerable Semantic Kernel frameworks are used in various applications. Exploitation could lead to complete system takeover, depending on the privileges of the account running the AI agent.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply patches for CVE-2026-26030 and CVE-2026-25592 in Semantic Kernel to prevent unsafe string interpolation.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-26030 Exploitation Attempt via Malicious Prompt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Review and sanitize all inputs to AI agent plugins to prevent prompt injection attacks as described in the overview section.</li>
<li>Monitor process creation events for suspicious processes spawned from the AI agent&rsquo;s process, leveraging the &ldquo;Detect Suspicious Process Execution from AI Agent&rdquo; Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ai</category><category>prompt-injection</category><category>rce</category><category>semantic-kernel</category></item></channel></rss>