CVE-2026-21513 is a high-severity (8.8) security feature bypass in Microsoft's MSHTML Framework, currently under active exploitation in the wild.
| Product | Version Start | Version End (excl.) | Status |
|---|---|---|---|
| windows_10_1607 | * | 10.0.14393.8868 | vulnerable |
| windows_10_1607 | * | 10.0.14393.8868 | vulnerable |
| windows_10_1809 | * | 10.0.17763.8389 | vulnerable |
| windows_10_1809 | * | 10.0.17763.8389 | vulnerable |
| windows_10_21h2 | * | 10.0.19044.6937 | vulnerable |
| windows_10_21h2 | * | 10.0.19044.6937 | vulnerable |
| windows_10_21h2 | * | 10.0.19044.6937 | vulnerable |
| windows_10_22h2 | * | 10.0.19045.6937 | vulnerable |
| windows_10_22h2 | * | 10.0.19045.6937 | vulnerable |
| windows_10_22h2 | * | 10.0.19045.6937 | vulnerable |
| windows_11_23h2 | * | 10.0.22631.6649 | vulnerable |
| windows_11_23h2 | * | 10.0.22631.6649 | vulnerable |
| windows_11_24h2 | * | 10.0.26100.7781 | vulnerable |
| windows_11_24h2 | * | 10.0.26100.7781 | vulnerable |
| windows_11_25h2 | * | 10.0.26200.7781 | vulnerable |
| windows_11_25h2 | * | 10.0.26200.7781 | vulnerable |
| windows_server_2012 | - | - | vulnerable |
| windows_server_2012 | r2 | r2 | vulnerable |
| windows_server_2016 | * | 10.0.14393.8868 | vulnerable |
| windows_server_2019 | * | 10.0.17763.8389 | vulnerable |
| windows_server_2022 | * | 10.0.20348.4711 | vulnerable |
| windows_server_2022_23h2 | * | 10.0.25398.2149 | vulnerable |
| windows_server_2025 | * | 10.0.26100.32313 | vulnerable |
Install the latest security updates provided by Microsoft through Windows Update or Windows Server Update Services (WSUS) to address the protection mechanism failure in the MSHTML framework.
Verify that Windows 10 (up to 19045.6937), Windows 11 (up to 26200.7781), and Windows Server versions (2012 through 2025) are updated to versions exceeding the vulnerable build thresholds identified in the CPE data.
Implement robust email filtering and web gateway policies to block malicious files or links that attempt to trigger MSHTML-based bypasses, as the attack vector typically involves network-delivered content.
Utilize EDR and SIEM tools to detect unusual process behavior originating from MSHTML-related components or attempts to bypass Windows security features like Mark-of-the-Web (MotW).
Monitor for unusual child processes spawned by applications utilizing the MSHTML engine, such as Outlook or Office. Look for log entries indicating security feature bypasses or failures in protection mechanisms (CWE-693). Network-level detection should focus on signatures identifying malicious HTML or script content designed to evade browser-based security controls. Review EDR telemetry for unauthorized modifications to security-sensitive registry keys or system files associated with web content rendering.
Experience superior visibility and a simpler approach to cyber risk management