Reprompt flaw lets attackers hijack Copilot sessions via malicious prompts

TL;DR Summary
Researchers exposed 'Reprompt', a flaw that injects commands via Copilot's URL q parameter to hijack an authenticated session and exfiltrate data, using P2P injection, double-request, and chain-request techniques; Microsoft patched the vulnerability on January 2026 Patch Tuesday, mainly affecting Copilot Personal rather than Microsoft 365 Copilot, and users should apply the latest Windows updates.
- Reprompt attack hijacked Microsoft Copilot sessions for data theft BleepingComputer
- Microsoft Copilot Reprompt exploit allowed attackers to steal your AI data Windows Central
- Your Copilot data can be hijacked with a single click - here's how ZDNET
- New One-Click Microsoft Copilot Vulnerability Grants Attackers Undetected Access to Sensitive Data Cyber Security News
Reading Insights
Total Reads
0
Unique Readers
5
Time Saved
5 min
vs 5 min read
Condensed
94%
976 → 54 words
Want the full story? Read the original article
Read on BleepingComputer