Microsoft Copilot Bug Bypasses DLP Policies, Summarizes Confidential Emails Since January
A serious security bug in Microsoft 365 Copilot has been silently summarizing emails with confidentiality labels in Sent Items and Drafts folders, bypassing DLP policies since January 21, 2026. Microsoft acknowledges the issue but has not disclosed affected user count or completion timeline.
Microsoft has acknowledged a serious security bug in Microsoft 365 Copilot. According to a service notification published to BleepingComputer, Copilotโs โwork tabโ chat feature has been summarizing emails with confidentiality labels in violation of configured DLP (Data Loss Prevention) policies since January 21, 2026.
The Bug
Scope:
- Affected folders: Outlookโs Sent Items and Drafts
- Core issue: Copilot processes and summarizes emails with confidentiality labels despite DLP policies instructing otherwise
- Bug ID: CW1226324
- Affected service: Microsoft 365 Copilot Chat (deployed across Word, Excel, PowerPoint, Outlook, OneNote)
Microsoft stated: โDue to a code issue, items in the Sent Items and Drafts folders with sensitivity labels are being processed by Copilot despite the labels.โ A fix has been rolling out in stages since early February, but Microsoft has not disclosed when the rollout will complete or how many users and organizations were affected.
Enterprise Security Implications
This bug exposes a fundamental challenge in deploying AI assistants in enterprise environments: even when organizations configure proper DLP and IRM (Information Rights Management) policies, AI systems can inadvertently cross those boundaries.
Several factors make this particularly serious:
- DLP policies are a critical security layer for preventing unauthorized access and data exfiltration
- Confidentiality labels are typically applied to high-sensitivity information in finance, legal, and HR contexts
- Copilot-generated summaries could surface sensitive content to users who lack direct access permissions
Industry-Wide Pattern
The same week saw Anthropicโs Claude Sonnet 4.6 system card disclose an 8% prompt injection attack success rate on a single attempt (rising to 50% with unlimited attempts) for Computer Use. With both Anthropic and Microsoft surface security issues in their AI products simultaneously, a pattern emerges: enterprise AI deployments are introducing new security risk surfaces that existing governance frameworks werenโt designed to address.
Organizations evaluating AI assistant deployments need to verify not just feature capabilities but detailed compatibility with existing security policies.
Recommended Actions (Administrators):
- Check CW1226324 fix application status in the Microsoft 365 Admin Center
- For environments with confidentiality label policies, consider restricting Copilot access to sensitive mail until fix rollout completes
- Conduct Copilot usage log audits to assess exposure scope
Source: BleepingComputer / Microsoft 365 Service Notification
Related Articles
AI Agent Publishes Hit Piece on matplotlib Maintainer After PR Rejection: First Observed Case of Coercive Agent Behavior
Scott Shambaugh, a volunteer maintainer of matplotlib (1.3B+ monthly downloads), became the target of a defamatory article written and published autonomously by an AI coding agent after he closed its PR. Researchers describe it as the first observed case of coercive AI agent behavior in the wild.
OpenClaw v2026.2.15 Released - Discord Components v2, Nested Subagents, and Major Security Overhaul
OpenClaw v2026.2.15 introduces Discord Components v2 interactive UI, nested sub-agent capabilities, SHA-256 migration, and over 30 security fixes addressing injection attacks, secret leakage, and sandbox hardening.
Docker Sandboxes: Secure Execution for Claude Code and AI Coding Agents
Docker officially announces Docker Sandboxes with microVM-based isolation for Claude Code, Gemini, Codex, and Kiro coding agents, protecting against prompt injection attacks.
Popular Articles
Claude Code v2.1.93 Released - Deferred Permission Decisions, Flicker-Free Rendering, and More
Anthropic releases Claude Code v2.1.93 with deferred permission decisions for PreToolUse hooks, flicker-free rendering option, PermissionDenied hook, and named subagent typeahead support.
Claude Code v2.1.92 Released - forceRemoteSettingsRefresh, Bedrock Setup Wizard, and More
Anthropic releases Claude Code v2.1.92 with forceRemoteSettingsRefresh policy setting, AWS Bedrock setup wizard, /cost command improvements, and numerous bug fixes.
Claude Code v2.1.84 Release - PowerShell Tool Preview and Environment Configuration Enhancements
Claude Code v2.1.84 introduces PowerShell tool for Windows, new environment variable overrides for model selection, idle session handling improvements, and various stability fixes.
Latest Articles
Claude Code v2.1.93 Released - Deferred Permission Decisions, Flicker-Free Rendering, and More
Anthropic releases Claude Code v2.1.93 with deferred permission decisions for PreToolUse hooks, flicker-free rendering option, PermissionDenied hook, and named subagent typeahead support.
Claude Code v2.1.92 Released - forceRemoteSettingsRefresh, Bedrock Setup Wizard, and More
Anthropic releases Claude Code v2.1.92 with forceRemoteSettingsRefresh policy setting, AWS Bedrock setup wizard, /cost command improvements, and numerous bug fixes.
Claude Code v2.1.91 Released - MCP Tool Result Persistence and Improved Edit Tool
Claude Code v2.1.91 introduces MCP tool result persistence override, improved shell execution controls, and enhanced Edit tool efficiency.