Skip to Content
Microsoft addresses 163 CVEs, 88 advisories for April Patch Tuesday
Following a long-established pattern, the fourth month of the year is one of the cruelest
Author placeholder

Microsoft on Tuesday released 163 patches affecting 17 product families. Eight of the addressed issues are considered by Microsoft to be of Critical severity, and one of those is expected to be exploited within the next 30 days. Eighteen have a CVSS base score of 8.0 or higher. One – the SharePoint Spoofing vulnerability called CVE-2026-32201 – is currently known to be under active exploit in the wild, and one other (CVE-2026-33825, a Defender bug) has been publicly disclosed.

At patch time, 24 CVEs were judged more likely to be exploited in the next 30 days by the company’s estimation; that includes the Defender bug but not the SharePoint bug. Various of this month’s issues are amenable to direct detection by Sophos protections, and we include information on those in the usual table below. Unusually, our protections list also includes a patch for a Critical-severity prototype pollution bug in Adobe’s Reader and Acrobat products.

The patch load this month falls just shy of last October’s record-breaking haul, but it also includes a massive set of advisories, most of them related to Chrome patches ingested by Edge. Six advisories concern Adobe, MITRE and AMD each contribute one for Windows, Microsoft itself contributes two already-patched CVEs for Chrome/Edge, and Chrome itself weighs in with 78. The tally doesn’t quite measure up to December 2025’s mighty Mariner-flavored banquet of advisories, but combined with the patch tally, it pushes this month’s items of concern to a daunting 251. Is this a taste of patch life in the OpenClaw / Glasswing era? There’s no way of knowing that yet, but we will all be watching with interest.

We are as always including at the end of this post appendices listing all Microsoft’s patches sorted by severity (Appendix A), by predicted exploitability timeline and CVSS Base score (Appendix B), and by product family (Appendix C). Appendix D lists this month’s advisories. Appendix E provides a breakout of 127 CVEs affecting various versions of Windows Server.

Finally, we note with pleasure that Microsoft has taken to providing CWE (Common Weakness Enumeration) information for virtually all of their patches. For now, to make the most of this new transparency, we’re adding an Appendix F, in which we look at the distribution of this month’s CWEs. (Three weaknesses, by the way, account for over half of this month’s patches. To find out which three, read to the end.)

By the numbers

  • Total CVEs: 163
  • Publicly disclosed: 1
  • Exploit detected: 1
  • Severity
    • Critical: 8
    • Important: 154
    • Moderate: 1
  • Impact:
    • Denial of Service: 8
    • Elevation of Privilege: 94
    • Information Disclosure: 20
    • Remote Code Execution: 20
    • Security Feature Bypass: 12
    • Spoofing: 8
    • Tampering: 1
  • CVSS base score 9.0 or greater: 2
  • CVSS base score 8.0 or greater: 18

 

pt2604-figure01.png

Figure 1: Elevation of Privilege represents the lion’s share of April’s CVEs, but over a third of the RCEs are Critical-class

Products

As is our custom for this list, CVEs that apply to more than one product family are counted once for each family they affect. We note, by the way, that CVE names don’t always reflect affected product families closely. In particular, some CVEs names in the Office family may mention products that don’t appear in the list of products affected by the CVE, and vice versa. 


pt2604-figure02.png

Figure 2: Windows dominates the patch list, though just four of those are Critical-class issues

pt2604-figure03.png

Figure 3: Over the years we have flagged repeatedly that April and October, and to a lesser extent January, tend to be high-load patch months. As 2026 unfolds, we’ll be keeping an eye on overall patch counts, but for now, we’ll simply note that the cumulative EoP total alone went up by 73 percent in April. The rest of 2026 might be quite a ride.

Notable April updates

In addition to the issues discussed above, a number of specific items merit attention. 

CVE-2026-33824 -- Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution

A Critical-severity RCE with a punishing 9.8 CVSS Base score, it’s a bit of a relief that Microsoft apparently found this one in-house rather than in the wild. The problem rests in Internet Key Exchange, the secure key-management protocol that negotiates secure IPsec associations – so, affecting great swaths of connectivity. This one comes with temporary mitigation options: If you cannot immediately install this update, adjust your traffic rules for UDP ports 500 and 4500 – blocking inbound traffic for systems that don’t use IKE, or configuring the ports to accept inbound traffic only from known peer addresses for systems that do. (There is a fine post on WindowsForum that discusses this bug and how to parse Microsoft’s guidance concerning it.) But do install this patch as soon as you can.

CVE-2026-32201 -- Microsoft SharePoint Server Spoofing Vulnerability

A true in-the-wild zero-day before getting its Patch Tuesday comeuppance, this bug would permit an unauthorized attacker to spoof an actual user, able to read or modify certain data and potentially adding heft to social-engineering trickery. It rates only an Important severity (or, if you prefer, a CVSS Base score of 6.5), but Microsoft confirms that it’s in active use. Prioritize your patching accordingly.

CVE-2026-33825 -- Microsoft Defender Elevation of Privilege Vulnerability

The only vulnerability publicly disclosed in advance of Patch Tuesday, this Important-severity EoP would allow an attacker to elevate privileges locally if Defender is enabled. Microsoft customers who have Defender enabled and take their automatic updates will be patched automatically, or can manually draw down the update if they don’t want to wait. Meanwhile, systems on which Defender is disabled cannot be exploited by this vulnerability. 

CVE-2026-32190 -- Microsoft PowerPoint Remote Code Execution Vulnerability
CVE-2026-33114 -- Microsoft Word Remote Code Execution Vulnerability
CVE-2026-33115 -- Microsoft Word Remote Code Execution Vulnerability

Office and 365 share three Critical-severity vulnerabilities this month; all three include Preview Pane as a vector.

CVE-2026-26151 -- Remote Desktop Spoofing Vulnerability

An excellent development: Starting this month, the Remote Desktop Connection app shows new security warnings when you open RDP files. This CVE makes that possible -- it literally beefs up the user interface’s warning of potentially dangerous operations. (Microsoft has the details on their site.) Considering RDP’s long reign atop the initial-attacker-access charts, it’s good to add some friction to the process.


Sophos protections

CVESophos Intercept X/Endpoint IPS

Sophos XGS Firewall

CVE-2026-26169Exp/2626169-AExp/2626169-A
CVE-2026-27908Exp/2627908-AExp/2627908-A
CVE-2026-27909Exp/2627909-AExp/2627909-A
CVE-2026-27914Exp/2627914-AExp/2627914-A
CVE-2026-27921Exp/2627921-AExp/2627921-A
CVE-2026-32070Exp/2632070-AExp/2632070-A
CVE-2026-32093Exp/2632093-AExp/2632093-A
CVE-2026-32152Exp/2632152-AExp/2632152-A
CVE-2026-32154Exp/2632154-AExp/2632154-A
CVE-2026-32162Exp/2632162-AExp/2632162-A
CVE-2026-32201SID:2312418SID:2312418
CVE-2026-32202SID:2312387, Troj/JSExp-YSID:2312387, Troj/JSExp-Y
CVE-2026-33825SID:2312409, ATK/BHammer-A, ATK/BHammer-B, ATK/BHammer-CSID:2312409, ATK/BHammer-A, ATK/BHammer-B, ATK/BHammer-C
CVE-2026-33826sid:2312419sid:2312419
CVE-2026-34621 (Adobe)Troj/PDF-BG

Troj/PDF-BG

 

 

As you can every month, if you don’t want to wait for your system to pull down Microsoft’s updates itself, you can download them manually from the Windows Update Catalog website. Run the winver.exe tool to determine which build of Windows you’re running, then download the Cumulative Update package for your specific system’s architecture and build number.

Appendix A: Vulnerability Impact and Severity

This is a list of April patches sorted by impact, then sub-sorted by severity. Each list is further arranged by CVE. 

Elevation of Privilege (94 CVEs)

Important severity
CVE-2026-20930Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-25184Applocker Filter Driver (applockerfltr.sys) Elevation of Privilege Vulnerability
CVE-2026-26152Microsoft Cryptographic Services Elevation of Privilege Vulnerability
CVE-2026-26153Windows Encrypted File System (EFS) Elevation of Privilege Vulnerability
CVE-2026-26159Remote Desktop Client Elevation of Privilege Vulnerability
CVE-2026-26160Remote Desktop Licensing Service Elevation of Privilege Vulnerability
CVE-2026-26161Windows Sensor Data Service Elevation of Privilege Vulnerability
CVE-2026-26162Windows OLE Elevation of Privilege Vulnerability
CVE-2026-26163Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-26165Windows Shell Elevation of Privilege Vulnerability
CVE-2026-26166Windows Shell Elevation of Privilege Vulnerability
CVE-2026-26167Windows Push Notifications Elevation of Privilege Vulnerability
CVE-2026-26168Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-26170PowerShell Elevation of Privilege Vulnerability
CVE-2026-26172Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVE-2026-26173Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-26174Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
CVE-2026-26176Windows Client Side Caching driver (csc.sys) Elevation of Privilege Vulnerability
CVE-2026-26177Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-26178Windows Advanced Rasterization Platform Elevation of Privilege Vulnerability
CVE-2026-26179Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-26180Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-26181Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2026-26182Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-26183Remote Access Management service/API (RPC server) Elevation of Privilege Vulnerability
CVE-2026-26184Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-27907Windows Storage Spaces Controller Elevation of Privilege Vulnerability
CVE-2026-27908Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability
CVE-2026-27909Windows Search Service Elevation of Privilege Vulnerability
CVE-2026-27910Windows Installer Elevation of Privilege Vulnerability
CVE-2026-27911Windows User Interface Core Elevation of Privilege Vulnerability
CVE-2026-27912Windows Kerberos Elevation of Privilege Vulnerability
CVE-2026-27914Microsoft Management Console Elevation of Privilege Vulnerability
CVE-2026-27915Windows UPnP Device Host Elevation of Privilege Vulnerability
CVE-2026-27916Windows UPnP Device Host Elevation of Privilege Vulnerability
CVE-2026-27917Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Elevation of Privilege Vulnerability
CVE-2026-27918Windows Shell Elevation of Privilege Vulnerability
CVE-2026-27919Windows UPnP Device Host Elevation of Privilege Vulnerability
CVE-2026-27920Windows UPnP Device Host Elevation of Privilege Vulnerability
CVE-2026-27921Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability
CVE-2026-27922Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-27923Desktop Window Manager Elevation of Privilege Vulnerability
CVE-2026-27924Desktop Window Manager Elevation of Privilege Vulnerability
CVE-2026-27926Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-27927Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-27929Windows LUA File Virtualization Filter Driver Elevation of Privilege Vulnerability
CVE-2026-32068Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
CVE-2026-32069Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-32070Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-32073Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-32074Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-32075Windows UPnP Device Host Elevation of Privilege Vulnerability
CVE-2026-32076Windows Storage Spaces Controller Elevation of Privilege Vulnerability
CVE-2026-32077Windows UPnP Device Host Elevation of Privilege Vulnerability
CVE-2026-32078Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-32080Windows WalletService Elevation of Privilege Vulnerability
CVE-2026-32082Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
CVE-2026-32083Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
CVE-2026-32086Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
CVE-2026-32087Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
CVE-2026-32089Windows Speech Brokered Api Elevation of Privilege Vulnerability
CVE-2026-32090Windows Speech Brokered Api Elevation of Privilege Vulnerability
CVE-2026-32091Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2026-32093Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
CVE-2026-32150Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
CVE-2026-32152Desktop Window Manager Elevation of Privilege Vulnerability
CVE-2026-32153Windows Speech Runtime Elevation of Privilege Vulnerability
CVE-2026-32154Desktop Window Manager Elevation of Privilege Vulnerability
CVE-2026-32155Desktop Window Manager Elevation of Privilege Vulnerability
CVE-2026-32158Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVE-2026-32159Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVE-2026-32160Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVE-2026-32162Windows COM Elevation of Privilege Vulnerability
CVE-2026-32163Windows User Interface Core Elevation of Privilege Vulnerability
CVE-2026-32164Windows User Interface Core Elevation of Privilege Vulnerability
CVE-2026-32165Windows User Interface Core Elevation of Privilege Vulnerability
CVE-2026-32167SQL Server Elevation of Privilege Vulnerability
CVE-2026-32168Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2026-32171Azure Logic Apps Elevation of Privilege Vulnerability
CVE-2026-32176SQL Server Elevation of Privilege Vulnerability
CVE-2026-32184Microsoft High Performance Compute (HPC) Pack Elevation of Privilege Vulnerability
CVE-2026-32192Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2026-32195Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-32216Windows Redirected Drive Buffering System Elevation of Privilege Vulnerability
CVE-2026-32219Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2026-32222Windows Win32k Elevation of Privilege Vulnerability
CVE-2026-32223Windows USB Printing Stack (usbprint.sys) Elevation of Privilege Vulnerability
CVE-2026-32224Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
CVE-2026-33098Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-33099Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-33100Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-33101Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2026-33104Win32k Elevation of Privilege Vulnerability
CVE-2026-33825Microsoft Defender Elevation of Privilege Vulnerability

 

Remote Code Execution (20 CVEs)

Critical severity
CVE-2026-32157Remote Desktop Client Remote Code Execution Vulnerability
CVE-2026-32190Microsoft PowerPoint Remote Code Execution Vulnerability
CVE-2026-33114Microsoft Word Remote Code Execution Vulnerability
CVE-2026-33115Microsoft Word Remote Code Execution Vulnerability
CVE-2026-33824Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability
CVE-2026-33826Windows Active Directory Remote Code Execution Vulnerability
CVE-2026-33827Windows TCP/IP Remote Code Execution Vulnerability
Important severity
CVE-2026-23657Microsoft Word Remote Code Execution Vulnerability
CVE-2026-26156Windows Hyper-V Remote Code Execution Vulnerability
CVE-2026-32149Windows Hyper-V Remote Code Execution Vulnerability
CVE-2026-32156Windows UPnP Device Host Remote Code Execution Vulnerability
CVE-2026-32183Windows Snipping Tool Remote Code Execution Vulnerability
CVE-2026-32189Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-32197Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-32198Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-32199Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-32200Microsoft PowerPoint Remote Code Execution Vulnerability
CVE-2026-32221Windows Graphics Component Remote Code Execution Vulnerability
CVE-2026-33095Microsoft Word Remote Code Execution Vulnerability
CVE-2026-33120Microsoft SQL Server Remote Code Execution Vulnerability

Information Disclosure (20 CVEs)

Important severity
CVE-2026-20806Windows COM Server Information Disclosure Vulnerability
CVE-2026-23653GitHub Copilot and Visual Studio Code Information Disclosure Vulnerability
CVE-2026-26155Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
CVE-2026-26169Windows Kernel Memory Information Disclosure Vulnerability
CVE-2026-27925Windows UPnP Device Host Information Disclosure Vulnerability
CVE-2026-27930Windows GDI Information Disclosure Vulnerability
CVE-2026-27931Windows GDI Information Disclosure Vulnerability
CVE-2026-32079Windows File Explorer Information Disclosure Vulnerability
CVE-2026-32081Package Catalog Information Disclosure Vulnerability
CVE-2026-32084Windows File Explorer Information Disclosure Vulnerability
CVE-2026-32085Remote Procedure Call Information Disclosure Vulnerability
CVE-2026-32151Windows Shell Information Disclosure Vulnerability
CVE-2026-32188Microsoft Excel Information Disclosure Vulnerability
CVE-2026-32212Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability
CVE-2026-32214Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability
CVE-2026-32215Windows Kernel Information Disclosure Vulnerability
CVE-2026-32217Windows Kernel Information Disclosure Vulnerability
CVE-2026-32218Windows Kernel Information Disclosure Vulnerability
CVE-2026-33103Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
CVE-2026-33822Microsoft Word Information Disclosure Vulnerability

Security Feature Bypass (12 CVEs)

Important severity
CVE-2026-0390UEFI Secure Boot Security Feature Bypass Vulnerability
CVE-2026-20928Windows Recovery Environment Security Feature Bypass Vulnerability
CVE-2026-23670Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability
CVE-2026-26143Microsoft PowerShell Security Feature Bypass Vulnerability
CVE-2026-26149Microsoft Power Apps Security Feature Bypass
CVE-2026-26175Windows Boot Manager Security Feature Bypass Vulnerability
CVE-2026-27906Windows Hello Security Feature Bypass Vulnerability
CVE-2026-27913Secure Boot Security Feature Bypass Vulnerability
CVE-2026-27928Windows Hello Security Feature Bypass Vulnerability
CVE-2026-32088Windows Biometric Service Security Feature Bypass Vulnerability
CVE-2026-32220Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability
CVE-2026-32225Windows Shell Security Feature Bypass Vulnerability

 

Denial of Service (8 CVEs)

Critical severity
CVE-2026-23666.NET Framework Denial of Service Vulnerability
Important severity
CVE-2026-26171.NET Denial of Service Vulnerability
CVE-2026-32071Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
CVE-2026-32181Connected User Experiences and Telemetry Service Denial of Service Vulnerability
CVE-2026-32203.NET and Visual Studio Denial of Service Vulnerability
CVE-2026-32226.NET Framework Denial of Service Vulnerability
CVE-2026-33096HTTP.sys Denial of Service Vulnerability
CVE-2026-33116.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability

 

Spoofing (8 CVEs)

Important severity
CVE-2026-20945Microsoft SharePoint Server Spoofing Vulnerability
CVE-2026-26151Remote Desktop Spoofing Vulnerability
CVE-2026-32072Active Directory Spoofing Vulnerability
CVE-2026-32178.NET Spoofing Vulnerability
CVE-2026-32196Windows Admin Center in Azure Portal Spoofing Vulnerability
CVE-2026-32201Microsoft SharePoint Server Spoofing Vulnerability
CVE-2026-32202Windows Shell Spoofing Vulnerability
Moderate severity
CVE-2026-33829Windows Snipping Tool Spoofing Vulnerability

 

Tampering (1 CVE)

Important severity
CVE-2026-26154Windows Server Update Service (WSUS) Tampering Vulnerability

 

Appendix B: Exploitability and CVSS

One CVE in April is known to be already under exploit in the wild.

Exploit detected
CVE-2026-32201Microsoft SharePoint Server Spoofing Vulnerability

 

This is a list of the 24 April CVEs judged by Microsoft to be more likely to be exploited in the wild within the first 30 days post-release. The list is arranged by CVE.

Exploitation more likely within the next 30 days
CVE-2026-0390UEFI Secure Boot Security Feature Bypass Vulnerability
CVE-2026-26151Remote Desktop Spoofing Vulnerability
CVE-2026-26169Windows Kernel Memory Information Disclosure Vulnerability
CVE-2026-26173Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-26177Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-26182Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-27906Windows Hello Security Feature Bypass Vulnerability
CVE-2026-27908Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability
CVE-2026-27909Windows Search Service Elevation of Privilege Vulnerability
CVE-2026-27913Secure Boot Security Feature Bypass Vulnerability
CVE-2026-27914Microsoft Management Console Elevation of Privilege Vulnerability
CVE-2026-27921Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability
CVE-2026-32070Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-32075Windows UPnP Device Host Elevation of Privilege Vulnerability
CVE-2026-32093Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
CVE-2026-32152Desktop Window Manager Elevation of Privilege Vulnerability
CVE-2026-32154Desktop Window Manager Elevation of Privilege Vulnerability
CVE-2026-32155Desktop Window Manager Elevation of Privilege Vulnerability
CVE-2026-32162Windows COM Elevation of Privilege Vulnerability
CVE-2026-32202Windows Shell Spoofing Vulnerability
CVE-2026-32225Windows Shell Security Feature Bypass Vulnerability
CVE-2026-33104Win32k Elevation of Privilege Vulnerability
CVE-2026-33825Microsoft Defender Elevation of Privilege Vulnerability
CVE-2026-33826Windows Active Directory Remote Code Execution Vulnerability

 

These are the April CVEs with a Microsoft-assessed CVSS Base score of 8.0 or higher. They are arranged by score and further sorted by CVE. For more information on how CVSS works, please see our series on patch prioritization schema

CVSS BaseCVSS TemporalCVETitle
9.88.5CVE-2026-33824Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability
9.07.9CVE-2026-26149Microsoft Power Apps Security Feature Bypass
8.87.7CVE-2026-26167Windows Push Notifications Elevation of Privilege Vulnerability
8.87.7CVE-2026-26178Windows Advanced Rasterization Platform Elevation of Privilege Vulnerability
8.87.7CVE-2026-32157Remote Desktop Client Remote Code Execution Vulnerability
8.87.7CVE-2026-32171Azure Logic Apps Elevation of Privilege Vulnerability
8.87.7CVE-2026-32225Windows Shell Security Feature Bypass Vulnerability
8.87.7CVE-2026-33120Microsoft SQL Server Remote Code Execution Vulnerability
8.77.6CVE-2026-27928Windows Hello Security Feature Bypass Vulnerability
8.47.3CVE-2026-32091Microsoft Brokering File System Elevation of Privilege Vulnerability
8.47.3CVE-2026-32162Windows COM Elevation of Privilege Vulnerability
8.47.3CVE-2026-32190Microsoft PowerPoint Remote Code Execution Vulnerability
8.47.3CVE-2026-32221Windows Graphics Component Remote Code Execution Vulnerability
8.47.3CVE-2026-33114Microsoft Word Remote Code Execution Vulnerability
8.47.3CVE-2026-33115Microsoft Word Remote Code Execution Vulnerability
8.17.1CVE-2026-33827Windows TCP/IP Remote Code Execution Vulnerability
8.07.0CVE-2026-27912Windows Kerberos Elevation of Privilege Vulnerability
8.07.0CVE-2026-33826Windows Active Directory Remote Code Execution Vulnerability

 

Appendix C: Products Affected

This is a list of April’s patches sorted by product family, then sub-sorted by severity. Each list is further arranged by CVE. Patches that are shared among multiple product families are listed multiple131 times, once for each product family. Certain issues for which advisories have been issued are covered in Appendix D, and issues affecting Windows Server are further sorted in Appendix E. All CVE titles are accurate as made available by Microsoft. For further information on why certain products may appear in titles and not product families (or vice versa), please consult Microsoft.

Windows (131 CVEs)

Critical severity
CVE-2026-32157Remote Desktop Client Remote Code Execution Vulnerability
CVE-2026-33824Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability
CVE-2026-33826Windows Active Directory Remote Code Execution Vulnerability
CVE-2026-33827Windows TCP/IP Remote Code Execution Vulnerability
Important severity
CVE-2026-0390UEFI Secure Boot Security Feature Bypass Vulnerability
CVE-2026-20806Windows COM Server Information Disclosure Vulnerability
CVE-2026-20928Windows Recovery Environment Security Feature Bypass Vulnerability
CVE-2026-20930Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-23670Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability
CVE-2026-25184Applocker Filter Driver (applockerfltr.sys) Elevation of Privilege Vulnerability
CVE-2026-26151Remote Desktop Spoofing Vulnerability
CVE-2026-26152Microsoft Cryptographic Services Elevation of Privilege Vulnerability
CVE-2026-26153Windows Encrypted File System (EFS) Elevation of Privilege Vulnerability
CVE-2026-26154Windows Server Update Service (WSUS) Tampering Vulnerability
CVE-2026-26155Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
CVE-2026-26156Windows Hyper-V Remote Code Execution Vulnerability
CVE-2026-26159Remote Desktop Client Elevation of Privilege Vulnerability
CVE-2026-26160Remote Desktop Licensing Service Elevation of Privilege Vulnerability
CVE-2026-26161Windows Sensor Data Service Elevation of Privilege Vulnerability
CVE-2026-26162Windows OLE Elevation of Privilege Vulnerability
CVE-2026-26163Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-26165Windows Shell Elevation of Privilege Vulnerability
CVE-2026-26166Windows Shell Elevation of Privilege Vulnerability
CVE-2026-26167Windows Push Notifications Elevation of Privilege Vulnerability
CVE-2026-26168Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-26169Windows Kernel Memory Information Disclosure Vulnerability
CVE-2026-26170PowerShell Elevation of Privilege Vulnerability
CVE-2026-26172Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVE-2026-26173Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-26174Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
CVE-2026-26175Windows Boot Manager Security Feature Bypass Vulnerability
CVE-2026-26176Windows Client Side Caching driver (csc.sys) Elevation of Privilege Vulnerability
CVE-2026-26177Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-26178Windows Advanced Rasterization Platform Elevation of Privilege Vulnerability
CVE-2026-26179Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-26180Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-26181Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2026-26182Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-26183Remote Access Management service/API (RPC server) Elevation of Privilege Vulnerability
CVE-2026-26184Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-27906Windows Hello Security Feature Bypass Vulnerability
CVE-2026-27907Windows Storage Spaces Controller Elevation of Privilege Vulnerability
CVE-2026-27908Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability
CVE-2026-27909Windows Search Service Elevation of Privilege Vulnerability
CVE-2026-27910Windows Installer Elevation of Privilege Vulnerability
CVE-2026-27911Windows User Interface Core Elevation of Privilege Vulnerability
CVE-2026-27912Windows Kerberos Elevation of Privilege Vulnerability
CVE-2026-27913Secure Boot Security Feature Bypass Vulnerability
CVE-2026-27914Microsoft Management Console Elevation of Privilege Vulnerability
CVE-2026-27915Windows UPnP Device Host Elevation of Privilege Vulnerability
CVE-2026-27916Windows UPnP Device Host Elevation of Privilege Vulnerability
CVE-2026-27917Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Elevation of Privilege Vulnerability
CVE-2026-27918Windows Shell Elevation of Privilege Vulnerability
CVE-2026-27919Windows UPnP Device Host Elevation of Privilege Vulnerability
CVE-2026-27920Windows UPnP Device Host Elevation of Privilege Vulnerability
CVE-2026-27921Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability
CVE-2026-27922Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-27923Desktop Window Manager Elevation of Privilege Vulnerability
CVE-2026-27924Desktop Window Manager Elevation of Privilege Vulnerability
CVE-2026-27925Windows UPnP Device Host Information Disclosure Vulnerability
CVE-2026-27926Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-27927Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-27928Windows Hello Security Feature Bypass Vulnerability
CVE-2026-27929Windows LUA File Virtualization Filter Driver Elevation of Privilege Vulnerability
CVE-2026-27930Windows GDI Information Disclosure Vulnerability
CVE-2026-27931Windows GDI Information Disclosure Vulnerability
CVE-2026-32068Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
CVE-2026-32069Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-32070Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-32071Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
CVE-2026-32072Active Directory Spoofing Vulnerability
CVE-2026-32073Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-32074Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-32075Windows UPnP Device Host Elevation of Privilege Vulnerability
CVE-2026-32076Windows Storage Spaces Controller Elevation of Privilege Vulnerability
CVE-2026-32077Windows UPnP Device Host Elevation of Privilege Vulnerability
CVE-2026-32078Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-32079Windows File Explorer Information Disclosure Vulnerability
CVE-2026-32080Windows WalletService Elevation of Privilege Vulnerability
CVE-2026-32081Package Catalog Information Disclosure Vulnerability
CVE-2026-32082Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
CVE-2026-32083Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
CVE-2026-32084Windows File Explorer Information Disclosure Vulnerability
CVE-2026-32085Remote Procedure Call Information Disclosure Vulnerability
CVE-2026-32086Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
CVE-2026-32087Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
CVE-2026-32088Windows Biometric Service Security Feature Bypass Vulnerability
CVE-2026-32089Windows Speech Brokered Api Elevation of Privilege Vulnerability
CVE-2026-32090Windows Speech Brokered Api Elevation of Privilege Vulnerability
CVE-2026-32091Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2026-32093Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
CVE-2026-32149Windows Hyper-V Remote Code Execution Vulnerability
CVE-2026-32150Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
CVE-2026-32151Windows Shell Information Disclosure Vulnerability
CVE-2026-32152Desktop Window Manager Elevation of Privilege Vulnerability
CVE-2026-32153Windows Speech Runtime Elevation of Privilege Vulnerability
CVE-2026-32154Desktop Window Manager Elevation of Privilege Vulnerability
CVE-2026-32155Desktop Window Manager Elevation of Privilege Vulnerability
CVE-2026-32156Windows UPnP Device Host Remote Code Execution Vulnerability
CVE-2026-32158Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVE-2026-32159Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVE-2026-32160Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVE-2026-32162Windows COM Elevation of Privilege Vulnerability
CVE-2026-32163Windows User Interface Core Elevation of Privilege Vulnerability
CVE-2026-32164Windows User Interface Core Elevation of Privilege Vulnerability
CVE-2026-32165Windows User Interface Core Elevation of Privilege Vulnerability
CVE-2026-32181Connected User Experiences and Telemetry Service Denial of Service Vulnerability
CVE-2026-32183Windows Snipping Tool Remote Code Execution Vulnerability
CVE-2026-32195Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-32202Windows Shell Spoofing Vulnerability
CVE-2026-32212Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability
CVE-2026-32214Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability
CVE-2026-32215Windows Kernel Information Disclosure Vulnerability
CVE-2026-32216Windows Redirected Drive Buffering System Elevation of Privilege Vulnerability
CVE-2026-32217Windows Kernel Information Disclosure Vulnerability
CVE-2026-32218Windows Kernel Information Disclosure Vulnerability
CVE-2026-32219Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2026-32220Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability
CVE-2026-32221Windows Graphics Component Remote Code Execution Vulnerability
CVE-2026-32222Windows Win32k Elevation of Privilege Vulnerability
CVE-2026-32223Windows USB Printing Stack (usbprint.sys) Elevation of Privilege Vulnerability
CVE-2026-32225Windows Shell Security Feature Bypass Vulnerability
CVE-2026-33096HTTP.sys Denial of Service Vulnerability
CVE-2026-33098Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-33099Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-33100Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-33101Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2026-33104Win32k Elevation of Privilege Vulnerability
Moderate severity
CVE-2026-33829Windows Snipping Tool Spoofing Vulnerability

365 (12 CVEs)

Critical severity
CVE-2026-32190Microsoft PowerPoint Remote Code Execution Vulnerability
CVE-2026-33114Microsoft Word Remote Code Execution Vulnerability
CVE-2026-33115Microsoft Word Remote Code Execution Vulnerability
Important severity
CVE-2026-23657Microsoft Word Remote Code Execution Vulnerability
CVE-2026-32188Microsoft Excel Information Disclosure Vulnerability
CVE-2026-32189Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-32197Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-32198Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-32199Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-32200Microsoft PowerPoint Remote Code Execution Vulnerability
CVE-2026-33095Microsoft Word Remote Code Execution Vulnerability
CVE-2026-33822Microsoft Word Information Disclosure Vulnerability

 

Office (11 CVEs)

Critical severity
CVE-2026-32190Microsoft PowerPoint Remote Code Execution Vulnerability
CVE-2026-33114Microsoft Word Remote Code Execution Vulnerability
CVE-2026-33115Microsoft Word Remote Code Execution Vulnerability
Important severity
CVE-2026-23657Microsoft Word Remote Code Execution Vulnerability
CVE-2026-32188Microsoft Excel Information Disclosure Vulnerability
CVE-2026-32189Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-32197Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-32198Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-32199Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-32200Microsoft PowerPoint Remote Code Execution Vulnerability
CVE-2026-33095Microsoft Word Remote Code Execution Vulnerability

 

.NET (6 CVEs)

Critical severity
CVE-2026-23666.NET Framework Denial of Service Vulnerability
Important severity
CVE-2026-26171.NET Denial of Service Vulnerability
CVE-2026-32226.NET Framework Denial of Service Vulnerability
CVE-2026-33116.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
CVE-2026-32178.NET Spoofing Vulnerability
CVE-2026-32203.NET and Visual Studio Denial of Service Vulnerability

 

Excel (5 CVEs)

Important severity
CVE-2026-32188Microsoft Excel Information Disclosure Vulnerability
CVE-2026-32189Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-32197Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-32198Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-32199Microsoft Excel Remote Code Execution Vulnerability

 

Azure (4 CVEs)

Important severity
CVE-2026-32168Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2026-32171Azure Logic Apps Elevation of Privilege Vulnerability
CVE-2026-32192Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2026-32196Windows Admin Center in Azure Portal Spoofing Vulnerability

 

SQL Server (3 CVEs)

Important severity
CVE-2026-32167SQL Server Elevation of Privilege Vulnerability
CVE-2026-32176SQL Server Elevation of Privilege Vulnerability
CVE-2026-33120Microsoft SQL Server Remote Code Execution Vulnerability


Visual Studio (3 CVEs)

Important severity
CVE-2026-23653GitHub Copilot and Visual Studio Code Information Disclosure Vulnerability
CVE-2026-32178.NET Spoofing Vulnerability
CVE-2026-32203.NET and Visual Studio Denial of Service Vulnerability


SharePoint (2 CVEs)

Important severity
CVE-2026-20945Microsoft SharePoint Server Spoofing Vulnerability
CVE-2026-32201Microsoft SharePoint Server Spoofing Vulnerability


Defender (1 CVE)

Important severity
CVE-2026-33825Microsoft Defender Elevation of Privilege Vulnerability

 

Dynamics 365 (1 CVE)

Important severity
CVE-2026-33103Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability

 

HPC Pack (1 CVE)

Important severity
CVE-2026-32184Microsoft High Performance Compute (HPC) Pack Elevation of Privilege Vulnerability


PowerApps (1 CVE)

Important severity
CVE-2026-26149Microsoft Power Apps Security Feature Bypass

 

PowerPoint (1 CVE)

Important severity
CVE-2026-32200Microsoft PowerPoint Remote Code Execution Vulnerability

 

PowerShell (1 CVE)

Important severity
CVE-2026-26143Microsoft PowerShell Security Feature Bypass Vulnerability

 

RDP Client for Windows (1 CVE)

Critical severity
CVE-2026-32157Remote Desktop Client Remote Code Execution Vulnerability

 

Windows Server Update Services (WSUS) (1 CVE)

Important severity
CVE-2026-32224Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability

 

 

Appendix D: Advisories and Other Products

There are 80 Edge-related advisories listed in April’s release, all but two from Chrome. Because the two from Microsoft were (like the Chrome CVEs) patched before Patch Tuesday, and because this post is already gruesomely long, we have massed all 80 together in the very long table below.

CVE-2026-5272Chromium: CVE-2026-5272 Heap buffer overflow in GPU
CVE-2026-5273Chromium: CVE-2026-5273 Use after free in CSS
CVE-2026-5274Chromium: CVE-2026-5274 Integer overflow in Codecs
CVE-2026-5275Chromium: CVE-2026-5275 Heap buffer overflow in ANGLE
CVE-2026-5276Chromium: CVE-2026-5276 Insufficient policy enforcement in WebUSB
CVE-2026-5277Chromium: CVE-2026-5277 Integer overflow in ANGLE
CVE-2026-5279Chromium: CVE-2026-5279 Object corruption in V8
CVE-2026-5280Chromium: CVE-2026-5280 Use after free in WebCodecs
CVE-2026-5281Chromium: CVE-2026-5281 Use after free in Dawn
CVE-2026-5283Chromium: CVE-2026-5283 Inappropriate implementation in ANGLE
CVE-2026-5284Chromium: CVE-2026-5284 Use after free in Dawn
CVE-2026-5285Chromium: CVE-2026-5285 Use after free in WebGL
CVE-2026-5286Chromium: CVE-2026-5286 Use after free in Dawn
CVE-2026-5287Chromium: CVE-2026-5287 Use after free in PDF
CVE-2026-5289Chromium: CVE-2026-5289 Use after free in Navigation
CVE-2026-5290Chromium: CVE-2026-5290 Use after free in Compositing
CVE-2026-5291Chromium: CVE-2026-5291 Inappropriate implementation in WebGL
CVE-2026-5292Chromium: CVE-2026-5292 Out of bounds read in WebCodecs
CVE-2026-5858Chromium: CVE-2026-5858 Heap buffer overflow in WebML
CVE-2026-5859Chromium: CVE-2026-5859 Integer overflow in WebML
CVE-2026-5860Chromium: CVE-2026-5860 Use after free in WebRTC
CVE-2026-5861Chromium: CVE-2026-5861 Use after free in V8
CVE-2026-5862Chromium: CVE-2026-5862 Inappropriate implementation in V8
CVE-2026-5863Chromium: CVE-2026-5863 Inappropriate implementation in V8
CVE-2026-5864Chromium: CVE-2026-5864 Heap buffer overflow in WebAudio
CVE-2026-5865Chromium: CVE-2026-5865 Type Confusion in V8
CVE-2026-5866Chromium: CVE-2026-5866 Use after free in Media
CVE-2026-5867Chromium: CVE-2026-5867 Heap buffer overflow in WebML
CVE-2026-5868Chromium: CVE-2026-5868 Heap buffer overflow in ANGLE
CVE-2026-5869Chromium: CVE-2026-5869 Heap buffer overflow in WebML
CVE-2026-5870Chromium: CVE-2026-5870 Integer overflow in Skia
CVE-2026-5871Chromium: CVE-2026-5871 Type Confusion in V8
CVE-2026-5872Chromium: CVE-2026-5872 Use after free in Blink
CVE-2026-5873Chromium: CVE-2026-5873 Out of bounds read and write in V8
CVE-2026-5874Chromium: CVE-2026-5874 Use after free in PrivateAI
CVE-2026-5875Chromium: CVE-2026-5875 Policy bypass in Blink
CVE-2026-5876Chromium: CVE-2026-5876 Side-channel information leakage in Navigation
CVE-2026-5877Chromium: CVE-2026-5877 Use after free in Navigation
CVE-2026-5878Chromium: CVE-2026-5878 Incorrect security UI in Blink
CVE-2026-5879Chromium: CVE-2026-5879 Insufficient validation of untrusted input in ANGLE
CVE-2026-5880Chromium: CVE-2026-5880 Incorrect security UI in browser UI
CVE-2026-5881Chromium: CVE-2026-5881 Policy bypass in LocalNetworkAccess
CVE-2026-5882Chromium: CVE-2026-5882 Incorrect security UI in Fullscreen
CVE-2026-5883Chromium: CVE-2026-5883 Use after free in Media
CVE-2026-5884Chromium: CVE-2026-5884 Insufficient validation of untrusted input in Media
CVE-2026-5885Chromium: CVE-2026-5885 Insufficient validation of untrusted input in WebML
CVE-2026-5886Chromium: CVE-2026-5886 Out of bounds read in WebAudio
CVE-2026-5887Chromium: CVE-2026-5887 Insufficient validation of untrusted input in Downloads
CVE-2026-5888Chromium: CVE-2026-5888 Uninitialized Use in WebCodecs
CVE-2026-5889Chromium: CVE-2026-5889 Cryptographic Flaw in PDFium
CVE-2026-5890Chromium: CVE-2026-5890 Race in WebCodecs
CVE-2026-5891Chromium: CVE-2026-5891 Insufficient policy enforcement in browser UI
CVE-2026-5892Chromium: CVE-2026-5892 Insufficient policy enforcement in PWAs
CVE-2026-5893Chromium: CVE-2026-5893 Race in V8
CVE-2026-5894Chromium: CVE-2026-5894 Inappropriate implementation in PDF
CVE-2026-5895Chromium: CVE-2026-5895 Incorrect security UI in Omnibox
CVE-2026-5896Chromium: CVE-2026-5896 Policy bypass in Audio
CVE-2026-5897Chromium: CVE-2026-5897 Incorrect security UI in Downloads
CVE-2026-5898Chromium: CVE-2026-5898 Incorrect security UI in Omnibox
CVE-2026-5899Chromium: CVE-2026-5899 Incorrect security UI in History Navigation
CVE-2026-5900Chromium: CVE-2026-5900 Policy bypass in Downloads
CVE-2026-5901Chromium: CVE-2026-5901 Policy bypass in DevTools
CVE-2026-5902Chromium: CVE-2026-5902 Race in Media
CVE-2026-5903Chromium: CVE-2026-5903 Policy bypass in IFrameSandbox
CVE-2026-5904Chromium: CVE-2026-5904 Use after free in V8
CVE-2026-5905Chromium: CVE-2026-5905 Incorrect security UI in Permissions
CVE-2026-5906Chromium: CVE-2026-5906 Incorrect security UI in Omnibox
CVE-2026-5907Chromium: CVE-2026-5907 Insufficient data validation in Media
CVE-2026-5908Chromium: CVE-2026-5908 Integer overflow in Media
CVE-2026-5909Chromium: CVE-2026-5909 Integer overflow in Media
CVE-2026-5910Chromium: CVE-2026-5910 Integer overflow in Media
CVE-2026-5911Chromium: CVE-2026-5911 Policy bypass in ServiceWorkers
CVE-2026-5912Chromium: CVE-2026-5912 Integer overflow in WebRTC
CVE-2026-5913Chromium: CVE-2026-5913 Out of bounds read in Blink
CVE-2026-5914Chromium: CVE-2026-5914 Type Confusion in CSS
CVE-2026-5915Chromium: CVE-2026-5915 Insufficient validation of untrusted input in WebML
CVE-2026-5918Chromium: CVE-2026-5918 Inappropriate implementation in Navigation
CVE-2026-5919Chromium: CVE-2026-5919 Insufficient validation of untrusted input in WebSockets
CVE-2026-33118Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVE-2026-33119Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability


Meanwhile, there are six updates from Adobe, all affecting ColdFusion 2025 - Update 6 and earlier versions, as well as ColdFusion 2023 - Update 18 and earlier versions. These are addresseḍ in APSB26-38. These are unrelated to the Adobe item covered in the Sophos protection noted above.

CVE-2026-27282Improper Input Validation (CWE-20)
CVE-2026-27304Improper Input Validation (CWE-20)
CVE-2026-27305Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22)
CVE-2026-27306Improper Input Validation (CWE-20)
CVE-2026-27307Uncontrolled Resource Consumption (CWE-400)
CVE-2026-27308Uncontrolled Resource Consumption (CWE-400)

 

Appendix E: Affected Windows Server versions

This is a table of 127 CVEs in the April release affecting Windows Server versions 2012 through 2025. The table differentiates among major versions of the platform but doesn’t go into deeper detail (eg., Server Core). An “x” indicates that the CVE does not apply to that version. CVE-2026-27906, CVE-2026-32153, CVE-2026-32195, and CVE-2026-32216 affect only client-side versions of Windows and are thus not included in the table. We do, however, include the two Important-severity, Windows-touching advisories from AMD and MITRE, since the Server versions they affect are known; those are indicated in this chart in blue.

Administrators are encouraged to use this appendix as a starting point to ascertain their specific exposure, as each reader’s situation, especially as it concerns products out of mainstream support, will vary. For specific Knowledge Base numbers, please consult Microsoft. 

CVE

S-12

12r2

S-16

S-19

S-22

23h2

S-25

CVE-2023-20585

×

×

×

×

×

×

CVE-2026-0390

×

×

×

×

CVE-2026-20806

×

×

×

CVE-2026-20928

×

×

CVE-2026-20930

×

×

×

CVE-2026-23670

×

×

CVE-2026-25184

×

×

×

×

×

CVE-2026-25250

CVE-2026-26151

CVE-2026-26152

CVE-2026-26153

×

×

×

CVE-2026-26154

CVE-2026-26155

×

×

CVE-2026-26156

×

×

CVE-2026-26159

CVE-2026-26160

CVE-2026-26161

×

×

×

CVE-2026-26162

CVE-2026-26163

×

CVE-2026-26165

×

×

×

×

CVE-2026-26166

×

×

×

×

CVE-2026-26167

×

×

CVE-2026-26168

CVE-2026-26169

×

×

CVE-2026-26170

×

×

CVE-2026-26172

×

×

×

×

CVE-2026-26173

CVE-2026-26174

CVE-2026-26175

×

×

×

CVE-2026-26176

CVE-2026-26177

CVE-2026-26178

×

×

CVE-2026-26179

×

×

×

×

×

CVE-2026-26180

CVE-2026-26181

×

×

×

×

×

CVE-2026-26182

CVE-2026-26183

CVE-2026-26184

×

×

×

CVE-2026-27907

×

×

×

×

×

CVE-2026-27908

CVE-2026-27909

CVE-2026-27910

CVE-2026-27911

×

×

CVE-2026-27912

CVE-2026-27913

×

CVE-2026-27914

CVE-2026-27915

CVE-2026-27916

CVE-2026-27917

×

CVE-2026-27918

×

×

×

CVE-2026-27919

CVE-2026-27920

CVE-2026-27921

CVE-2026-27922

CVE-2026-27923

CVE-2026-27924

×

×

×

×

×

CVE-2026-27925

CVE-2026-27926

×

×

×

CVE-2026-27927

×

×

×

CVE-2026-27928

×

×

CVE-2026-27929

CVE-2026-27930

CVE-2026-27931

×

×

×

×

CVE-2026-32068

CVE-2026-32069

×

×

×

CVE-2026-32070

CVE-2026-32071

×

×

CVE-2026-32072

×

×

CVE-2026-32073

CVE-2026-32074

×

×

×

CVE-2026-32075

CVE-2026-32076

×

×

×

×

×

CVE-2026-32077

CVE-2026-32078

×

×

×

CVE-2026-32079

×

×

CVE-2026-32080

×

×

CVE-2026-32081

×

×

CVE-2026-32082

CVE-2026-32083

CVE-2026-32084

CVE-2026-32085

×

×

CVE-2026-32086

CVE-2026-32087

CVE-2026-32088

×

×

×

CVE-2026-32089

×

×

CVE-2026-32090

×

×

CVE-2026-32091

×

×

CVE-2026-32093

CVE-2026-32149

×

×

CVE-2026-32150

CVE-2026-32151

CVE-2026-32152

×

×

×

×

CVE-2026-32154

×

×

CVE-2026-32155

×

×

×

×

CVE-2026-32156

CVE-2026-32157

CVE-2026-32158

×

×

×

CVE-2026-32159

×

×

×

CVE-2026-32160

×

×

×

CVE-2026-32162

×

×

×

CVE-2026-32163

×

×

×

CVE-2026-32164

×

×

CVE-2026-32165

×

×

×

CVE-2026-32181

×

×

×

×

CVE-2026-32183

CVE-2026-32202

CVE-2026-32212

CVE-2026-32214

CVE-2026-32215

×

×

×

CVE-2026-32217

CVE-2026-32218

×

×

×

×

CVE-2026-32219

×

×

×

×

×

×

CVE-2026-32220

×

×

×

×

×

×

CVE-2026-32221

×

×

×

×

×

×

CVE-2026-32222

×

×

×

×

×

×

CVE-2026-32223

×

×

×

×

×

×

CVE-2026-32225

CVE-2026-33096

×

×

×

×

×

×

CVE-2026-33098

×

×

CVE-2026-33099

×

CVE-2026-33100

CVE-2026-33101

×

×

×

×

×

CVE-2026-33104

CVE-2026-33824

×

×

CVE-2026-33826

×

CVE-2026-33827

CVE-2026-33829

 

Appendix F: Common Weakness Enumeration

As mentioned above, Microsoft now states which CWEs affect very nearly every CVE they address. (We noted only two CVEs that had no CWE information -- CVE-2026-26149, the PowerApps security feature bypass, and the advisory-only CVE-2026-33118 affecting Edge/Chrome). We’re looking forward to analyzing this data over time. 

This month, we decided to start off by seeing which CWEs were most heavily represented in this inaugural dataset. (For the moment, we’re not diving into specific CVE-CWE correlations -- for instance, which CWEs are more prevalent among which product families -- nor are we comparing prevalence of CWEs to seriousness of bugs, such as might be indicated by CVSS scores. Nor are we pointing out where the popular 2025 CWE Top 25 Most Dangerous Software Weaknesses List maps to April’s list.) 

The April dataset of 163 patches references 196 CWEs. Of that 163, 29 patches referenced two CVEs, and five referenced three CWEs. Meanwhile, there were just 42 unique CWEs represented this month (the latest MITRE catalog, version 4.19.1, defines 944 total CWEs) and just three of those accounted for over half of all vulnerabilities patched in April, as shown in the table below. 

CWECountCWE Name
CWE-41656Use After Free
CWE-36234Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-2014Improper Input Validation
CWE-1228Heap-based Buffer Overflow
CWE-1258Out-of-bounds Read
CWE-8228Untrusted Pointer Dereference
CWE-2006Exposure of Sensitive Information to an Unauthorized Actor
CWE-4156Double Free
CWE-2845Improper Access Control
CWE-1263Buffer Over-read
CWE-4763NULL Pointer Dereference
CWE-5323Insertion of Sensitive Information into Log File
CWE-772Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-792Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-892Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CWE-1212Stack-based Buffer Overflow
CWE-1912Integer Underflow (Wrap or Wraparound)
CWE-2692Improper Privilege Management
CWE-3062Missing Authentication for Critical Function
CWE-3672Time-of-check Time-of-use (TOCTOU) Race Condition
CWE-4002Uncontrolled Resource Consumption
CWE-5022Deserialization of Untrusted Data
CWE-6932Protection Mechanism Failure
CWE-8432Access of Resource Using Incompatible Type ('Type Confusion')
CWE-591Improper Link Resolution Before File Access ('Link Following')
CWE-1381Improper Neutralization of Special Elements
CWE-1901Integer Overflow or Wraparound
CWE-2121Improper Removal of Sensitive Information Before Storage or Transfer
CWE-2801Improper Handling of Insufficient Permissions or Privileges
CWE-2851Improper Authorization
CWE-2871Improper Authentication
CWE-3491Acceptance of Extraneous Untrusted Data With Trusted Data
CWE-3571Insufficient UI Warning of Dangerous Operations
CWE-5221Insufficiently Protected Credentials
CWE-6111Improper Restriction of XML External Entity Reference
CWE-6811Incorrect Conversion between Numeric Types
CWE-7551Improper Handling of Exceptional Conditions
CWE-8071Reliance on Untrusted Inputs in a Security Decision
CWE-8351Loop with Unreachable Exit Condition ('Infinite Loop')
CWE-9081Use of Uninitialized Resource
CWE-9221Insecure Storage of Sensitive Information
CWE-12201Insufficient Granularity of Access Control

 

Among the 29 CVEs that doubled up on their CWEs, the vast majority combined CWE-416 and CWE-362 – that is, a use-after-free plus a race condition. Though findings such as these are not exactly shocking for longtime observers, it’s exciting to have fresh statistics in hand as we contemplate whether the barn-busting April patch harvest is the shape of things to come.