Inside the Fix: Analysis of In-the-Wild Exploit of CVE-2026-21513

Maor Dahan

Feb 20, 2026

Maor Dahan

Maor Dahan

Written by

Maor Dahan

Maor Dahan is a Senior Security Researcher at Akamai with more than a decade of experience in the cybersecurity industry. He specializes in operating system internals, vulnerability research, and malware analysis. Maor also has extensive experience designing and developing advanced detection and prevention mechanisms for innovative security products such as EDR, EPP, and virtualization-based security.

Share

Executive summary

  • On February 2026’s Patch Tuesday, Microsoft patched CVE-2026-21513, a security features bypass vulnerability within MSHTML framework.
  • The vulnerability affects all Windows versions, is actively exploited in the wild, and carries a CVSS score of 8.8.
  • Using PatchDiff-AI, Akamai researchers performed automated root cause analysis of the patch and correlated it with an observed in-the-wild exploit attributed to the Russian state-sponsored threat actor APT28.
  • This blog post provides a technical breakdown of CVE-2026-21513, a description of its root cause, and an analysis of its exploitation.
  • We have included a list of indicators of compromise (IOCs) in this blog post to assist in defense against this threat.

The vulnerability

Microsoft’s February 2026 Patch Tuesday addressed 59 vulnerabilities, including six actively exploited zero-days. CVE-2026-21513 stands out because of its active exploitation, high impact, and ability to bypass browser security boundaries and trigger arbitrary file execution.

We used the multi-agent system called PatchDiff-AI to analyze CVE-2026-21513 and its patch. PatchDiff-AI generated a detailed report that reveals insights about the vulnerable component and the attack vector.

The root cause

The report by PatchDiff-AI ties CVE-2026-21513 to a specific function within ieframe.dll (Internet Explorer frame). The vulnerability resides in the logic responsible for handling hyperlink navigation. Insufficient validation of the target URL allows attacker-controlled input to reach code paths that invoke ShellExecuteExW, enabling execution of local or remote resources outside the intended browser security context (Figure 1).

Snippet from PatchDiff-AI report, pinpointing the vulnerable code path Fig. 1: Snippet from PatchDiff-AI report, pinpointing the vulnerable code path

The code path visualization in Figure 2 shows flow differences in the function _AttemptShellExecuteForHlinkNavigate applied by the patch.

PatchDiff-AI compares the vulnerable function before and after the patch Fig. 2: PatchDiff-AI compares the vulnerable function before and after the patch

To trigger the vulnerable code block, we needed to invoke Internet Explorer using an ActiveX form to track down what exactly initiates the flow. Using the component of “System.Windows.Forms.WebBrowser” and displaying it on the “System.Windows.Forms.Form” object, we loaded an HTML file that was parsed and constructed using the MSHTML and IEFRAME modules.

Another important component is the “htmlfile,” which exposes the DOM interface and allows us to manipulate it in a way that will trigger the vulnerable function.

While exploring the vulnerable code and the function calls that trigger it, we were led to the following exploit.

The exploit

By correlating the vulnerable code path with public threat intelligence, we identified a sample that was leveraging this functionality: document.doc.LnK.download.

The sample was first submitted to VirusTotal on January 30, 2026, shortly before February’s Patch Tuesday, and is associated with infrastructure linked to APT28, an active Russian state-sponsored threat actor (Figure 3).

A VirusTotal screenshot of APT28’s exploit Fig. 3: A VirusTotal screenshot of APT28’s exploit

This payload involves a specially crafted Windows Shortcut (.lnk) that embeds an HTML file immediately after the standard LNK structure.

The LNK file initiates communication with the domain wellnesscaremed[.]com, which is attributed to APT28 and has been in extensive use for the campaign’s multistage payloads.

The exploit leverages nested iframes and multiple DOM contexts to manipulate trust boundaries.

This technique allows the attacker to bypass Mark of the Web (MotW) and Internet Explorer Enhanced Security Configuration (IE ESC), effectively downgrading the security context before triggering the vulnerable navigation flow. Ultimately, this allows attacker-controlled content to reach a code path that invokes ShellExecuteExW, leading to execution outside of the browser sandbox (Figure 4).

{ h1 = new window[0].ActiveXObject('htmlfile'); };
('<html><body><iframe src=%22about:blank%22></iframe><iframe src=%22about:blank%22></iframe>%3cscript defer%3ewindow[1].document.Script.open(%22http:///%22,%22_parent%22)%3c/script%3e</body></html>'));
Fig. 4: A call to the vulnerable code block using the “document.Script.open()” method

If we run this script in Internet Explorer directly, we will encounter the security feature mentioned above, which warns the user and reduces the chances for successful exploitation (Figure 5).

A user warning before the script is executed Fig. 5: A user warning before the script is executed

Successful exploitation will bypass the security features and execute code controlled by the attacker. The screenshot in Figure 6 shows the top of the call stack, a very long one, where we can see the call to the vulnerable function _AttemptShellExecuteForHlinkNavigate

The call stack during exploitation Fig. 6: The call stack during exploitation

While the observed campaign leverages malicious .LNK files, the vulnerable code path can be triggered through any component embedding MSHTML. Therefore, additional delivery mechanisms beyond LNK-based phishing should be expected.

The fix

Microsoft introduced stricter validation to the hyperlink protocol that ensures supported protocols (such as file://, http://, and https://) will execute within the browser context rather than being passed directly to ShellExecuteExW.

Protecting your assets

Applying Microsoft’s February 2026 security updates fully mitigates this vulnerability.

APT28’s domains are tracked in Akamai’s proprietary threat intelligence. Akamai Hunt detects and alerts on activity patterns associated with this attack [T1204.001, T1566.001], and automatically notifies customers when vulnerable assets are detected.

PatchDiff-AI quickly analyzes the root cause of a vulnerability, enabling rapid root cause identification of vulnerabilities and accelerating analysis of in-the-wild exploitations.

IOCs

 

Name

Indicator

document.doc.LnK

aefd15e3c395edd16ede7685c6e97ca0350a702ee7c8585274b457166e86b1fa

Domain

wellnesscaremed[.]com

MITRE Techniques

T1204.001, T1566.001

   
Maor Dahan

Feb 20, 2026

Maor Dahan

Maor Dahan

Written by

Maor Dahan

Maor Dahan is a Senior Security Researcher at Akamai with more than a decade of experience in the cybersecurity industry. He specializes in operating system internals, vulnerability research, and malware analysis. Maor also has extensive experience designing and developing advanced detection and prevention mechanisms for innovative security products such as EDR, EPP, and virtualization-based security.

Tags

Share

Related Blog Posts

Security Research
One Is a Fluke, 3 Is a Pattern: MCP Back-End Vulnerabilities
May 12, 2026
Akamai researchers uncover vulnerabilities in three MCP servers. Learn about CVE-2025-66335 and how to secure your AI-to-backend connection.
Security Research
CVE-2026-34354: Guardicore Local Privilege Escalation Vulnerability
May 08, 2026
Read the technical details of a security vulnerability (CVE-2026-34354) in Akamai Guardicore Platform Agent for Windows — and get clear guidance on mitigation.
Security Research
The New Ouroboros Technique and How It Fits in dMSA’s Security Model
May 04, 2026
dMSA is more than a service account migration feature. Learn what its security model is trying to protect, how the implementation works, and where Ouroboros fits.