One-Click RCE in Azure Windows Admin Center Allow Attacker to Execute Arbitrary Commands
Cybersecurity NewsArchived Apr 17, 2026✓ Full text saved
Windows Admin Center is a locally deployed, browser-based management tool used by IT administrators to manage Windows servers, clients, and clusters from a centralized graphical interface. This newly discovered critical flaw, identified by Cymulate Research Labs, allows attackers to achieve unauthenticated, one-click remote code execution (RCE) on both Azure-integrated and on-premises WAC deployments. By simply […] The post One-Click RCE in Azure Windows Admin Center Allow Attacker to Execute Ar
Full text archived locally
✦ AI Summary· Claude Sonnet
Home Cyber Security News One-Click RCE in Azure Windows Admin Center Allow Attacker to Execute Arbitrary...
Windows Admin Center is a locally deployed, browser-based management tool used by IT administrators to manage Windows servers, clients, and clusters from a centralized graphical interface.
This newly discovered critical flaw, identified by Cymulate Research Labs, allows attackers to achieve unauthenticated, one-click remote code execution (RCE) on both Azure-integrated and on-premises WAC deployments.
By simply coercing a victim into visiting a tampered URL, adversaries can secretly execute arbitrary commands and take over target networks.
The vulnerabilities were responsibly disclosed to Microsoft on August 22, 2025. Following the report, Microsoft successfully applied server-side patches to secure all Azure-managed instances.
Because this fix was implemented on the service side, cloud customers are protected automatically without requiring any manual action.
However, organizations using on-premises WAC deployments must proactively update their systems to the latest release to close the vulnerability and prevent exploitation.
The waconazure app runs in the Azure portal via an iframe (source: Cymulate)
Core Vulnerabilities Driving the Exploit
According to the technical report published by Cymulate Research Labs, the exploit chain relies on three underlying architectural weaknesses that attackers combine for maximum impact:
Response-based cross-site scripting (XSS) allows attackers to inject arbitrary JavaScript into both Azure portal flows and on-premises error handling mechanisms.
Insecure redirect handling causes WAC to accept externally controlled gateway URLs without proper validation, enabling threat actors to hijack legitimate application flows for spoofing and phishing attacks.
Insecure credential storage in on-premises setups leaves sensitive Azure access and refresh tokens directly in the browser’s local storage, exposing them to immediate theft via the XSS flaw.
The research highlights distinct attack paths and consequences depending on how the Windows Admin Center environment is deployed.
Unsanitized error messages enable HTML injection (source: Cymulate)
Azure-managed environments allow attackers to craft authentic-looking URLs containing malicious payloads that prompt fake basic or NTLM authentication, silently harvesting user credentials from a trusted Microsoft origin.
On-premises deployments carry a significantly higher security impact because threat actors can force the gateway to execute arbitrary PowerShell commands on managed servers.
Connected local gateways expose stored Azure tokens, facilitating lateral movement that grants attackers the victim’s full cloud privileges and tenant control.
The Exploit Chain in Action
Cymulate researchers demonstrated that the complete attack chain requires minimal user interaction.
An attacker-hosted payload can automatically steal client credentials (Source: Cymulate)
An adversary needs to register a valid domain name, secure a trusted web certificate, and forge a WAC gateway URL. This malicious link can then be delivered through phishing emails, masked links, or automated web redirection.
Once the unsuspecting victim clicks the link, the WAC application automatically redirects traffic to the attacker-controlled server. The rogue server then responds with a crafted error message containing hidden scripts.
Because the application fails to sanitize the incoming response properly, the malicious code executes directly within the highly privileged WAC browser environment.
This exploit clearly proves that developers must rigorously validate both client input and server responses to prevent complex attacks. While Azure-hosted WAC customers are already protected, the security risk remains critical for internal networks.
Cymulate Research Labs strongly advises all security teams managing on-premises Windows Admin Center deployments to upgrade to the latest, patched Microsoft release immediately.
Administrators must verify that no outdated instances remain active on their network to prevent complete infrastructure compromise.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
RELATED ARTICLESMORE FROM AUTHOR
Cyber Security News
Hackers Target Israeli Desalination Plants With ZionSiphon Sabotage Malware
Cyber Security News
Hackers Target Trucking and Freight Firms to Steal Real-World Cargo Shipments
Cyber Security News
Microsoft Confirms Windows 11 Updates May Force Users to Enter BitLocker Recovery Key
Top 10
Top 10 Best User Access Management Tools in 2026
April 4, 2026
Top 10 Best VPN For Chrome in 2026
April 4, 2026
20 Best Application Performance Monitoring Tools in 2026
April 3, 2026
Top 10 Best VPN For Linux In 2026
April 3, 2026
10 Best VPN For Privacy In 2026
April 2, 2026