VSCode Extensions Flaws Expose 128M Users to Attacks: Code Execution & Data Theft

by Chief Editor

VS Code Extensions: A Growing Attack Surface for Developers

A recent wave of security vulnerabilities discovered in popular Visual Studio Code (VSCode) extensions highlights a growing concern: the expanding attack surface within the software development lifecycle. Collectively downloaded over 128 million times, extensions like Code Runner, Markdown Preview Enhanced, Microsoft Live Preview, and others have been found with flaws ranging from information disclosure to remote code execution (RCE).

The Risks of Extension Vulnerabilities

VSCode extensions are powerful tools that enhance the IDE’s functionality, but they operate with significant access to a developer’s environment. This access includes files, terminals, and network resources, making them attractive targets for malicious actors. Exploitation can lead to lateral movement within a corporate network, data exfiltration, and even complete system takeover.

Researchers at Ox Security identified several critical vulnerabilities. The CVE-2025-65717 vulnerability in the Live Server extension (72+ million downloads) allows attackers to steal local files by directing a target to a malicious webpage. The CVE-2025-65715 flaw in Code Runner (37+ million downloads) enables remote code execution through manipulation of the extension’s configuration file. A high-severity vulnerability, CVE-2025-65716, impacts Markdown Preview Enhanced (8.5+ million downloads), allowing JavaScript execution via crafted Markdown files. A one-click XSS vulnerability was also found in Microsoft Live Preview (11+ million downloads).

Beyond VS Code: The Broader Impact

The implications extend beyond VS Code itself. The vulnerabilities also affect alternative IDEs compatible with VSCode extensions, such as Cursor and Windsurf. This underscores a systemic risk associated with the extension ecosystem, rather than being isolated to a single platform.

What Developers Can Do Now

Developers should adopt a proactive security posture. Avoid running unnecessary localhost servers and opening untrusted HTML files. Be cautious when applying untrusted configurations or pasting snippets into settings.json files. Regularly review installed extensions and remove those that are no longer needed. Prioritize installing extensions from reputable publishers.

The Future of IDE Security: A Shift in Focus

These recent discoveries signal a necessary shift in focus towards IDE security. Traditionally, security efforts have centered on securing the core IDE and the code within it. However, the proliferation of extensions introduces a modern layer of complexity and risk.

The Rise of Supply Chain Attacks in Development

The vulnerabilities in VSCode extensions are a prime example of a supply chain attack. Attackers are targeting not the end-user directly, but rather the tools and components they rely on. This trend is expected to continue, with attackers increasingly focusing on compromising open-source libraries, build tools, and, as we’ve seen, IDE extensions.

AI-Powered Security Tools for Extension Management

As the number of extensions grows, manual review and vulnerability management develop into increasingly challenging. AI-powered security tools are emerging to automate this process. These tools can analyze extension code, identify potential vulnerabilities, and provide risk assessments. They can also monitor for unexpected setting changes and alert developers to suspicious activity.

Verified Status Isn’t Enough

A recent flaw allows malicious extensions to bypass verified status, meaning the “verified” badge isn’t a guarantee of safety. This highlights the need for more robust verification processes and continuous monitoring of extension behavior, even after they’ve been approved.

Staying Secure in a Changing Landscape

The security of the development environment is no longer solely the responsibility of the IDE vendor. Developers must take ownership of their security posture by adopting secure coding practices, carefully vetting extensions, and leveraging available security tools. The future of IDE security will depend on a collaborative effort between developers, vendors, and the security community.

FAQ

Q: What is an IDE extension?
A: An IDE extension is a add-on that expands the functionality of an Integrated Development Environment (IDE) like VS Code.

Q: How can I protect myself from malicious extensions?
A: Remove unnecessary extensions, install only from reputable publishers, and monitor for unexpected setting changes.

Q: Are AI-powered IDEs more vulnerable?
A: AI-powered IDEs that utilize VSCode-compatible extensions are susceptible to the same vulnerabilities as VS Code itself.

Q: What is a supply chain attack?
A: A supply chain attack targets the tools and components developers rely on, rather than the end-user directly.

Q: Is the “verified” badge on extensions enough to ensure safety?
A: No, a recent flaw allows malicious extensions to bypass verified status.

You may also like

Leave a Comment