One-Click RCE in Azure Windows Admin Center Lets Attackers Execute Arbitrary Commands
The chained bugs are tracked collectively as CVE‑2026‑32196 and stem from control‑flow hijacking in WAC’s web logic that turns a single click into arbitrary PowerShell execution and possible Azure tenant compromise.
Researchers from Cymulate Research Labs discovered that multiple weaknesses in Windows Admin Center’s Azure‑integrated and on‑prem deployments can be combined into a powerful attack chain.
By abusing a crafted gateway URL, an attacker can force the victim’s browser to talk to a rogue “WAC‑like” server under the attacker’s control, without any prior authentication.
The issues were reported to Microsoft in August 2025; Azure‑hosted WAC was fixed server‑side, while on‑prem customers must upgrade to the latest Windows Admin Center build.
Microsoft treated the Azure SaaS side as a cloud‑only issue remediated centrally and therefore did not assign a separate cloud CVE, but the on‑premises impact is tracked under CVE‑2026‑32196.
CVE‑2026‑32196 is driven by three core problems in WAC’s design and response handling.
Once XSS is triggered, the attacker’s script can call internal WAC APIs, send cross‑frame messages inside the Azure portal, and steal tokens or execute commands as if they were the logged‑in admin.
On Azure‑managed WAC, a forged portal URL with a malicious gatewayUrl parameter sends the victim’s browser to an attacker‑controlled HTTPS service that returns a crafted JSON error and injects JavaScript via the unsanitized message field.
That script runs inside the embedded waconazure iframe, giving access to WAC context, notifications, and UI flows for phishing, NTLM/Basic credential harvesting, and subtle social engineering inside the Azure portal.
On on‑prem WAC, the same gateway logic still exists but runs in the gateway’s own origin, raising the impact from XSS to direct RCE.
A single click on a tampered WAC URL can cause the victim browser to invoke WAC’s PowerShell execution APIs and run arbitrary commands on any managed server the admin can reach, without additional prompts.
If that gateway is linked to Azure, the injected script can also read Azure management tokens from local storage and exfiltrate them, enabling full user impersonation and lateral movement into the tenant.
Organizations are at the highest risk if they:
Recommended actions:
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post One-Click RCE in Azure Windows Admin Center Lets Attackers Execute Arbitrary Commands appeared first on Cyber Security News.
Today's links Tiktokification shall set us free: Zuck keeps accidentally freeing his hostages. Hey look…
Deploying AI models on a dedicated server is the best approach when you need consistent…
Creating visual content used to take hours of tedious work. You had to learn complex…
Advertising is one of the industries where, at first glance, AI seems to be an…
By its very nature, Formula One is an extreme and fast-paced sport, sometimes described as the ‘fastest R&D lab…
Mobile apps are more than simple tools for simple tasks in 2026. These days, users…
This website uses cookies.