Skip to main content
Mallory

Edge Regression Breaks Right-Click Paste in Microsoft Teams Desktop

patch-regressionwidely-deployed-product-advisoryendpoint-software-vulnerability
Updated April 19, 2026 at 09:02 AM3 sources
Share:
Edge Regression Breaks Right-Click Paste in Microsoft Teams Desktop

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Microsoft confirmed that a recent Microsoft Edge update introduced a regression that disables the right-click Paste option in the Microsoft Teams desktop client, leaving the context-menu entry greyed out for URLs, text, and images. The issue affects Windows and macOS systems running Teams desktop version 26072.519.4556.7438, which relies on an Electron-based framework and the Edge WebView2 runtime; Teams for Web is not affected.

Users reported the problem across enterprise and personal accounts, including Teams Free and Insider builds, and Microsoft said reinstalling Teams or clearing its cache does not fix it. The company has identified the cause and is deploying a staged fix while monitoring telemetry, but has not given a firm timeline for full remediation. Until the update reaches affected users, Microsoft is advising use of keyboard shortcuts such as Ctrl+V on Windows and Cmd+V on macOS and encouraging feedback or service health reports from impacted tenants.

Timeline

  1. Apr 16, 2026

    Microsoft begins staged rollout of a fix

    Microsoft said it identified the cause of the regression and started deploying a fix in stages while monitoring telemetry. As of the reporting, the company had not provided a firm timeline for full remediation to all affected users.

  2. Apr 16, 2026

    Microsoft acknowledges Edge-related Teams paste bug

    Microsoft acknowledged the issue in a service health notification and said a recent Microsoft Edge update introduced a regression affecting Teams desktop clients that rely on the Edge WebView2 runtime. The company noted that keyboard shortcuts such as Ctrl+V and Cmd+V still worked as a workaround, while Teams for Web was not affected.

  3. Apr 14, 2026

    Users begin reporting Teams right-click Paste failures

    Users started reporting that the Microsoft Teams desktop client could no longer paste URLs, text, or images via the right-click context menu on Windows and macOS. Reports indicated the issue affected enterprise and personal accounts, and reinstalling Teams or clearing its cache did not fix it.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Malware

Affected Products

Related Stories

Microsoft Reverts Teams Update After Desktop Client Launch Failures

Microsoft Reverts Teams Update After Desktop Client Launch Failures

Microsoft reverted a service update after it caused some **Microsoft Teams desktop client** users to become stuck on the loading screen with the error, “We’re having trouble loading your message. Try refreshing.” The company tracked the disruption as incident `TM1283300`, initially describing it as a transient service infrastructure issue before identifying the root cause as a regression in the Teams client build-caching system that pushed some older desktop builds into an unhealthy state. Microsoft said the impact appears limited to the **desktop client**, with no indication that web or mobile users were affected. The company reported that its automated recovery system helped remediate the issue, then fully rolled back the problematic update and monitored telemetry and customer feedback to confirm recovery. Impacted users were instructed to fully quit and restart Teams so the reverted configuration could propagate, though Microsoft did not disclose how many customers or regions were affected.

2 weeks ago
ClickFix Social Engineering Expands to Browser JavaScript and Terminal Paste Attacks

ClickFix Social Engineering Expands to Browser JavaScript and Terminal Paste Attacks

Threat actors are expanding **ClickFix**-style social engineering beyond simple “copy/paste this command” lures, including a campaign that abuses **Pastebin comments** to push victims toward executing attacker-supplied **JavaScript** in their browser to hijack cryptocurrency swap flows. The Pastebin comments promote a fake “Swapzone.io arbitrage exploit” and route users through a `rawtext[.]host` link to a Google Doc (“Swapzone.io – ChangeNOW Profit Method”) that instructs users to run JavaScript which can modify the swap process in-session and redirect funds to attacker-controlled wallets; the reporting notes this may be an early example of ClickFix being used to directly alter webpage functionality for theft. Separately, Objective-See documented ClickFix as a rapidly growing infection technique on **macOS and Windows** that relies on persuading users to paste attacker-controlled commands into a terminal, enabling execution without exploiting software vulnerabilities and potentially bypassing macOS protections such as **Gatekeeper** and **Notarization**. The post describes a practical macOS-focused mitigation that intervenes at “paste time” to disrupt many ClickFix attempts, implemented in *BlockBlock*, while also outlining limitations and potential bypasses—reinforcing that ClickFix is primarily a user-manipulation problem that defenders should address with both technical controls and user-execution friction.

1 months ago
Microsoft Teams Vulnerabilities Allowing Message and Caller Impersonation

Microsoft Teams Vulnerabilities Allowing Message and Caller Impersonation

Researchers at Check Point disclosed four critical vulnerabilities in Microsoft Teams that allowed attackers to impersonate executives, alter chat history, and forge notifications or caller identities without detection. These flaws, now patched, enabled manipulation of message content without the usual 'Edited' label, spoofing of alerts to appear from trusted colleagues, and renaming of chats to misrepresent participants. The vulnerabilities exploited Teams' messaging architecture, including the reuse of unique message identifiers and manipulation of hidden conversation parameters, fundamentally undermining the trust in digital communications for over 320 million monthly users. Microsoft was notified of the issues in March 2024 and addressed them through a series of patches, with the final fix released in October 2025. The vulnerabilities, tracked as CVE-2024-38197 among others, affected both internal users and external guests, posing significant risks of social engineering, data theft, and unauthorized actions. Attackers could trick users into clicking malicious links or sharing sensitive information by making messages and calls appear to originate from high-profile executives or trusted sources, highlighting the importance of prompt patching and ongoing vigilance in collaboration platforms.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.