Reprompt flaw lets attackers hijack Copilot sessions via malicious prompts

1 min read
Source: BleepingComputer
Reprompt flaw lets attackers hijack Copilot sessions via malicious prompts
Photo: BleepingComputer
TL;DR Summary

Researchers exposed 'Reprompt', a flaw that injects commands via Copilot's URL q parameter to hijack an authenticated session and exfiltrate data, using P2P injection, double-request, and chain-request techniques; Microsoft patched the vulnerability on January 2026 Patch Tuesday, mainly affecting Copilot Personal rather than Microsoft 365 Copilot, and users should apply the latest Windows updates.

Share this article

Reading Insights

Total Reads

0

Unique Readers

5

Time Saved

5 min

vs 5 min read

Condensed

94%

97654 words

Want the full story? Read the original article

Read on BleepingComputer