Edge Regression Breaks Right-Click Paste in Microsoft Teams Desktop
Microsoft confirmed that a recent Microsoft Edge update introduced a regression that disables the right-click Paste option in the Microsoft Teams desktop client, leaving the context-menu entry greyed out for URLs, text, and images. The issue affects Windows and macOS systems running Teams desktop version 26072.519.4556.7438, which relies on an Electron-based framework and the Edge WebView2 runtime; Teams for Web is not affected.
Users reported the problem across enterprise and personal accounts, including Teams Free and Insider builds, and Microsoft said reinstalling Teams or clearing its cache does not fix it. The company has identified the cause and is deploying a staged fix while monitoring telemetry, but has not given a firm timeline for full remediation. Until the update reaches affected users, Microsoft is advising use of keyboard shortcuts such as Ctrl+V on Windows and Cmd+V on macOS and encouraging feedback or service health reports from impacted tenants.
Timeline
Apr 16, 2026
Microsoft begins staged rollout of a fix
Microsoft said it identified the cause of the regression and started deploying a fix in stages while monitoring telemetry. As of the reporting, the company had not provided a firm timeline for full remediation to all affected users.
Apr 16, 2026
Microsoft acknowledges Edge-related Teams paste bug
Microsoft acknowledged the issue in a service health notification and said a recent Microsoft Edge update introduced a regression affecting Teams desktop clients that rely on the Edge WebView2 runtime. The company noted that keyboard shortcuts such as Ctrl+V and Cmd+V still worked as a workaround, while Teams for Web was not affected.
Apr 14, 2026
Users begin reporting Teams right-click Paste failures
Users started reporting that the Microsoft Teams desktop client could no longer paste URLs, text, or images via the right-click context menu on Windows and macOS. Reports indicated the issue affected enterprise and personal accounts, and reinstalling Teams or clearing its cache did not fix it.
See the full picture in Mallory
Mallory subscribers get deeper analysis on every story, including:
Who’s affected and how
Deep-dive technical analysis
Actionable next steps for your team
IPs, domains, hashes, and more
Ask questions and take action on every story
Filter by topic, classification, timeframe
Get matching stories delivered automatically
Sources
Related Stories

Microsoft Reverts Teams Update After Desktop Client Launch Failures
Microsoft reverted a service update after it caused some **Microsoft Teams desktop client** users to become stuck on the loading screen with the error, “We’re having trouble loading your message. Try refreshing.” The company tracked the disruption as incident `TM1283300`, initially describing it as a transient service infrastructure issue before identifying the root cause as a regression in the Teams client build-caching system that pushed some older desktop builds into an unhealthy state. Microsoft said the impact appears limited to the **desktop client**, with no indication that web or mobile users were affected. The company reported that its automated recovery system helped remediate the issue, then fully rolled back the problematic update and monitored telemetry and customer feedback to confirm recovery. Impacted users were instructed to fully quit and restart Teams so the reverted configuration could propagate, though Microsoft did not disclose how many customers or regions were affected.
2 weeks ago
ClickFix Social Engineering Expands to Browser JavaScript and Terminal Paste Attacks
Threat actors are expanding **ClickFix**-style social engineering beyond simple “copy/paste this command” lures, including a campaign that abuses **Pastebin comments** to push victims toward executing attacker-supplied **JavaScript** in their browser to hijack cryptocurrency swap flows. The Pastebin comments promote a fake “Swapzone.io arbitrage exploit” and route users through a `rawtext[.]host` link to a Google Doc (“Swapzone.io – ChangeNOW Profit Method”) that instructs users to run JavaScript which can modify the swap process in-session and redirect funds to attacker-controlled wallets; the reporting notes this may be an early example of ClickFix being used to directly alter webpage functionality for theft. Separately, Objective-See documented ClickFix as a rapidly growing infection technique on **macOS and Windows** that relies on persuading users to paste attacker-controlled commands into a terminal, enabling execution without exploiting software vulnerabilities and potentially bypassing macOS protections such as **Gatekeeper** and **Notarization**. The post describes a practical macOS-focused mitigation that intervenes at “paste time” to disrupt many ClickFix attempts, implemented in *BlockBlock*, while also outlining limitations and potential bypasses—reinforcing that ClickFix is primarily a user-manipulation problem that defenders should address with both technical controls and user-execution friction.
1 months ago
Microsoft Teams Vulnerabilities Allowing Message and Caller Impersonation
Researchers at Check Point disclosed four critical vulnerabilities in Microsoft Teams that allowed attackers to impersonate executives, alter chat history, and forge notifications or caller identities without detection. These flaws, now patched, enabled manipulation of message content without the usual 'Edited' label, spoofing of alerts to appear from trusted colleagues, and renaming of chats to misrepresent participants. The vulnerabilities exploited Teams' messaging architecture, including the reuse of unique message identifiers and manipulation of hidden conversation parameters, fundamentally undermining the trust in digital communications for over 320 million monthly users. Microsoft was notified of the issues in March 2024 and addressed them through a series of patches, with the final fix released in October 2025. The vulnerabilities, tracked as CVE-2024-38197 among others, affected both internal users and external guests, posing significant risks of social engineering, data theft, and unauthorized actions. Attackers could trick users into clicking malicious links or sharing sensitive information by making messages and calls appear to originate from high-profile executives or trusted sources, highlighting the importance of prompt patching and ongoing vigilance in collaboration platforms.
1 months ago