HomeSample Page

Sample Page Title


Ravie LakshmananFeb 18, 2026Vulnerability / Software program Safety

Vital Flaws Present in 4 VS Code Extensions with Over 125 Million Installs

Cybersecurity researchers have disclosed a number of safety vulnerabilities in 4 common Microsoft Visible Studio Code (VS Code) extensions that, if efficiently exploited, might enable risk actors to steal native information and execute code remotely.

The extensions, which have been collectively put in greater than 125 million instances, are Stay Server, Code Runner, Markdown Preview Enhanced, and Microsoft Stay Preview.

“Our analysis demonstrates {that a} hacker wants just one malicious extension, or a single vulnerability inside one extension, to carry out lateral motion and compromise whole organizations,” OX Safety researchers Moshe Siman Tov Bustan and Nir Zadok mentioned in a report shared with The Hacker Information.

Particulars of the vulnerabilities are as follows –

  • CVE-2025-65717 (CVSS rating: 9.1) – A vulnerability in Stay Server that permits attackers to exfiltrate native information, tricking a developer into visiting a malicious web site when the extension is operating, inflicting JavaScript embedded within the web page to crawl and extract information from the native improvement HTTP server that runs at localhost:5500, and transmit them to a website beneath their management. (Stays unpatched)
  • CVE-2025-65716 (CVSS rating: 8.8) – A vulnerability in Markdown Preview Enhanced that permits attackers to execute arbitrary JavaScript code by importing a crafted markdown (.md) file, permitting native port enumeration and exfiltration to a website beneath their management. (Stays unpatched)
  • CVE-2025-65715 (CVSS rating: 7.8) – A vulnerability in Code Runner that permits attackers to execute arbitrary code by convincing a consumer to change the “settings.json” file by way of phishing or social engineering. (Stays unpatched)
  • A vulnerability in Microsoft Stay Preview permits attackers to entry delicate information on a developer’s machine by tricking a sufferer into visiting a malicious web site when the extension is operating, which then permits specifically crafted JavaScript requests concentrating on the localhost to enumerate and exfiltrate delicate information. (No CVE, Fastened silently by Microsoft in model 0.4.16 launched in September 2025)

To safe the event surroundings, it is important to keep away from making use of untrusted configurations, disable or uninstall non-essential extensions, harden the native community behind a firewall to limit inbound and outbound connections, periodically replace extensions, and switch off localhost-based providers when not in use.

“Poorly written extensions, overly permissive extensions, or malicious ones can execute code, modify information, and permit attackers to take over a machine and exfiltrate info,” OX Safety mentioned. “Retaining susceptible extensions put in on a machine is an instantaneous risk to a corporation’s safety posture: it might take just one click on, or a downloaded repository, to compromise all the pieces.”

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles