Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Open VSX Bug Fixed in VS Code Extension Security

Critical Open VSX Bug Fixed in VS Code Extension Security

Posted on March 27, 2026 By CWS

Researchers have recently unveiled a significant security vulnerability within the Open VSX pre-publish scanning tool, which has since been addressed. This flaw previously enabled harmful Microsoft Visual Studio Code (VS Code) extensions to bypass security screenings and become publicly available in the registry. Koi Security’s Oran Simhony detailed in a report to The Hacker News that the issue arose from the scanning pipeline’s single boolean return value, which ambiguously indicated either no scanners were configured or all failed to execute.

Vulnerability Details and Impact

Last month, the Eclipse Foundation, responsible for Open VSX, announced new security checks for VS Code extensions to counteract the threat of malicious extensions. Open VSX serves as the marketplace for Cursor, Windsurf, and other VS Code variants, and the implementation of these checks was seen as a crucial step toward enhancing security. However, the flaw, dubbed ‘Open Sesame,’ allowed extensions to pass as successful even when scanner jobs encountered failures, rendering the extensions downloadable from Open VSX.

The flaw also highlighted issues with database connection pool exhaustion, preventing scanner jobs from queuing. Furthermore, a recovery service designed to retry failed scans suffered from the same misinterpretation, allowing extensions to bypass the scan entirely under certain conditions.

Exploitation and Mitigation

Exploiting this vulnerability did not require special access, as individuals with a free publisher account could exploit it to publish malicious extensions. By overwhelming the publish endpoint with .VSIX extensions, attackers could exhaust the database resources, causing scanning failures. The Eclipse Foundation addressed this issue in Open VSX version 0.32.0, following responsible disclosure on February 8, 2026.

Koi Security emphasized that while pre-publish scanning is vital, the problem lay in the pipeline design, where a single boolean was unable to differentiate between ‘no action required’ and ‘action failed,’ effectively compromising the infrastructure under stress.

Lessons and Future Outlook

The incident underscores a common software design flaw: fail-open error handling disguised as a legitimate ‘nothing to do’ scenario. Koi Security advises developers creating similar pipelines to explicitly define failure states to avoid conflating ‘no work needed’ with ‘work failed.’ This approach can prevent vulnerabilities from being exploited under pressure.

As industries increasingly rely on digital marketplaces, ensuring robust security measures is paramount. The prompt resolution of the Open VSX vulnerability serves as a reminder of the ongoing need for vigilance and proactive security practices in software development.

The Hacker News Tags:Cybersecurity, DevSecOps, Eclipse Foundation, Koi Security, malicious extensions, Open VSX, pre-publish scanning, security vulnerability, Software Security, VS Code

Post navigation

Previous Post: Silver Fox Targets Japanese Firms with Tax Phishing Scheme
Next Post: Critical Malware Alert for Popular Linux Compression Tool

Related Posts

What 2025 Is Teaching Us About Cloud Defense What 2025 Is Teaching Us About Cloud Defense The Hacker News
China-Linked TA416 Intensifies Cyber Attacks on Europe China-Linked TA416 Intensifies Cyber Attacks on Europe The Hacker News
Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More The Hacker News
U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks The Hacker News
ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots The Hacker News
Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Lyrie.ai Enhances AI Security with New Protocol
  • Hackers Exploit GitHub with Fake AI Repositories
  • Checkmarx Jenkins Plugin Compromised by TeamPCP
  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Lyrie.ai Enhances AI Security with New Protocol
  • Hackers Exploit GitHub with Fake AI Repositories
  • Checkmarx Jenkins Plugin Compromised by TeamPCP
  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark