Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

February 21, 2026

Why 84% of Security Programs Are Falling Behind

February 21, 2026

Android Malware Hijacks Google Gemini to Stay Hidden

February 20, 2026
Facebook X (Twitter) Instagram
Saturday, February 21
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Flaws in Popular IDE Extensions Allow Data Exfiltration
News

Flaws in Popular IDE Extensions Allow Data Exfiltration

Team-CWDBy Team-CWDFebruary 20, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Researchers at OX Security have detected four vulnerabilities in three of the most popular integrated development environments (IDEs) that could lead to cyber-attacks.

In a report published on February 17, OX Security shared details about the four new flaws, including two high-severity and one critical, affecting Microsoft Visual Studio Code (VS Code).

These vulnerabilities also impact Cursor and Windsurf, two forks of VS Code that provide AI-assisted software development tools (aka ‘vibe coding’ platforms).

The affected extensions were collectively downloaded over 128 million times.

The researchers warned that despite disclosing the vulnerabilities to these platforms’ maintainers in July and August 2025 through multiple channels, including direct email, their GitHub pages and social networks, none have yet responded.

Three of the vulnerabilities were disclosed by MITRE on February 16 and allocated a common vulnerabilities and exposures (CVE) identifier.

Vulnerabilities Affecting VS Code and ‘Vibe Coding’ Forks

The vulnerabilities described include:

  • CVE-2025-65717 (CVSS v3.1 score: 9.1) is a vulnerability in the Live Server extension for VS Code – with over 72 million downloads – that allows a remote, unauthenticated attacker to exfiltrate files from a developer’s local machine. OX Security warned that attackers only need to send a malicious link to the victim while Live Server is running in the background to exploit the flaw
  • CVE-2025-65716 (CVSS v3.1 score: 8.8) is a vulnerability in Markdown Preview Enhanced, a VS Code extension with over 8.5 million downloads designed to provide a richer Markdown authoring experience. It allows attackers to exploit how Markdown files preview HTML tags in order to execute arbitrary JavaScript code, which is able to communicate with localhost, allowing maliciously crafted Markdown files to scan the current local network and exfiltrate data to a remote server
  • CVE-2025-65715 (CVSS v3.1 score: 7.8) is a vulnerability in Code Runner – an extension with over 37 million downloads – that allows attackers to execute arbitrary code (RCE) by convincing a user to alter the “settings.json” file through phishing or social engineering
  • A fourth vulnerability in Microsoft Live Preview (over 11 million downloads) allows attackers to access sensitive files on a developer’s machine by tricking a victim into visiting a malicious website when the extension is running, which then enables specially crafted JavaScript requests targeting the localhost to enumerate and exfiltrate sensitive files

While OX Security claims that the first three vulnerabilities remains unpatched, the researchers said Microsoft silently fixed the fourth on in version 0.4.16 of VS Code released in September 2025. MITRE did not disclose the fourth vulnerability and it has not been assigned any CVE identifier.

Recommendations to IDE Users

OX Security said that the research demonstrated that a malicious hacker only needs to exploit a single vulnerability within one extension to perform lateral movement and compromise entire organizations.

These vulnerabilities “expose a critical blind spot in modern development security,” said the researchers.

“While organizations invest heavily in securing production environments, the developer’s local machine remains a largely unprotected gateway to an organization’s most sensitive assets.”

The OX Security report provided two sets of recommendations for IDE and vibe coding tool users to mitigate such vulnerabilities.

The first list of recommendations are workaround implementations in order to keep using the affected extensions without being impacted by potential exploits:

  • Avoid opening untrusted HTML while localhost servers are running
  • Avoid running servers on localhost
  • Avoid applying untrusted configurations. Never paste or run snippets in the global settings.json from emails, chats or unverified sources
  • Restrict extension risk. Only install trusted extensions, and monitor or back up settings.json to detect unexpected changes

In a second list of recommendations, the OX Security researchers outlined some general best practices for protecting IDEs:

  • Disable or uninstall non-essential wxtensions
  • Harden your local network by applying security controls like a well-configured local firewall to restrict inbound and outbound connections for development services
  • Maintain a rigorous update schedule allowing for immediately applying security updates for all software, including IDEs, extensions, operating systems and development dependencies, to address known vulnerabilities quickly

Recommendations to IDE Extension Maintainers

Finally, the researchers also criticized the lack of response from extension maintainers despite months of responsible disclosure attempts through multiple channels.

“It underscores a systemic problem: there is no accountability framework for extension security and no incentive structure to ensure timely remediation of critical vulnerabilities,” they added.

They provided the maintainers of the affected extensions with some solutions to prevent such vulnerabilities to be exploited. These included:

  • Mandatory security review processes before extensions are published to marketplaces, similar to app store vetting
  • Automated vulnerability scanning using AI-powered security testing tools to analyze new extensions before they reach developers
  • Enforceable response requirements for maintainers of popular extensions, including mandatory CVE issuance and patch timelines



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFirst Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
Next Article National Gas CTO Darren Curley on IT/OT Security Integration
Team-CWD
  • Website

Related Posts

News

ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

February 21, 2026
News

Why 84% of Security Programs Are Falling Behind

February 21, 2026
News

Android Malware Hijacks Google Gemini to Stay Hidden

February 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How it preys on personal data – and how to stay safe

October 23, 2025

What are brushing scams and how do I stay safe?

December 24, 2025

2025’s most common passwords were as predictable as ever

January 21, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.