Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise

Posted on August 14, 2025August 14, 2025 By CWS

A important safety vulnerability in GitHub Copilot and Visible Studio Code has been found that permits attackers to realize distant code execution via immediate injection assaults, probably resulting in full system compromise of builders’ machines. 

The vulnerability, tracked as CVE-2025-53773, exploits GitHub Copilot’s capacity to change challenge configuration information, significantly the .vscode/settings.json file, enabling attackers to bypass safety controls and execute arbitrary instructions on the right track techniques.

Key Takeaways1.  CVE-2025-53773 makes use of immediate injection to allow Copilot’s “YOLO mode”.2. Creates botnet “ZombAIs,” spreads AI viruses through Git.3. Replace Visible Studio 2022 instantly.

GitHub Copilot “YOLO Mode” Vulnerability 

The vulnerability facilities round GitHub Copilot’s functionality to create and write information within the workspace with out specific consumer approval, with modifications being instantly persistent to disk somewhat than offered as reviewable diffs. 

Safety researchers found that by manipulating the .vscode/settings.json file, attackers can allow what’s generally known as “YOLO mode” by including the configuration line “chat.instruments.autoApprove”: true. 

This experimental function, current by default in commonplace VS Code installations, disables all consumer confirmations and grants the AI agent unrestricted entry to execute shell instructions, browse the online, and carry out different privileged operations throughout Home windows, macOS, and Linux techniques.

The assault mechanism depends on immediate injection strategies the place malicious directions are embedded in supply code information, internet pages, GitHub points, or different content material that Copilot processes. 

These directions may even make the most of invisible Unicode characters to stay hidden from builders whereas nonetheless being processed by the AI mannequin. 

The malicious immediate is processed, Copilot mechanically modifies the settings file to allow auto-approval mode, instantly escalating its privileges with out consumer information or consent.

Researchers efficiently demonstrated conditional immediate injection strategies that may goal particular working techniques, permitting attackers to deploy platform-specific payloads. 

Full management of the developer’s host

The vulnerability permits attackers to affix compromised developer machines to botnets, creating what researchers time period “ZombAIs” – AI-controlled compromised techniques that may be remotely commanded.

Extra regarding is the potential for creating self-propagating AI viruses that may embed malicious directions in Git repositories and unfold as builders obtain and work together with contaminated code. 

The vulnerability additionally permits modification of different important configuration information, comparable to .vscode/duties.json, and the addition of malicious MCP (Mannequin Context Protocol) servers, increasing the assault floor considerably. 

These capabilities open the door for the deployment of malware, ransomware, info stealers, and the institution of persistent command and management channels.

Threat FactorsDetailsAffected ProductsGitHub Copilot- Visible Studio Code- Microsoft Visible Studio 2022ImpactRemote Code ExecutionExploit Conditions–  Person interplay required (UI:R)- Native assault vector (AV:L)- Immediate injection supply mechanism- Goal should course of malicious contentCVSS 3.1 Score7.8 (Excessive)

Mitigations

Microsoft assigned this vulnerability a CVSS 3.1 rating of seven.8/6.8, classifying it as “Vital” severity with the weak point categorized as CWE-77 (Improper Neutralization of Particular Parts utilized in a Command). 

The vulnerability was responsibly disclosed on June 29, 2025, and Microsoft confirmed the problem was already being tracked internally earlier than releasing patches as a part of the August 2025 Patch Tuesday replace.

The repair addresses the core concern by stopping AI brokers from modifying security-relevant configuration information with out specific consumer approval. 

Microsoft Visible Studio 2022 model 17.14.12 contains the safety replace that mitigates this vulnerability. 

Safety specialists advocate that organizations instantly replace their improvement environments and implement extra controls to forestall AI brokers from modifying their very own configuration settings.

Enhance your SOC and assist your workforce shield what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Compromise, Copilot, Full, GitHub, Injection, Leads, Prompt, RCE, System, Vulnerability

Post navigation

Previous Post: Multiple GitLab Vulnerabilities Enables Account Takeover and Stored XSS Exploitation
Next Post: Microsoft Exchange Server Vulnerabilities Let Attackers Spoof and Tamper Over Network

Related Posts

Developing Collaborative Threat Intelligence Sharing Frameworks Cyber Security News
Halo Security Honored with 2025 MSP Today Product of the Year Award Cyber Security News
New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users Cyber Security News
Threat Actors Compromise 270+ Legitimate Websites With Malicious JavaScript Using JSFireTruck Obfuscation Cyber Security News
Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets Cyber Security News
10 Best Virtual Machine (VM) Monitoring Tools in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New HTTP/2 ‘MadeYouReset’ Vulnerability Enables Large-Scale DoS Attacks
  • Canada’s House of Commons Hit by Cyberattack Exploiting Recent Microsoft vulnerability
  • Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution
  • Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack
  • Adobe’s August 2025 Patch Tuesday

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New HTTP/2 ‘MadeYouReset’ Vulnerability Enables Large-Scale DoS Attacks
  • Canada’s House of Commons Hit by Cyberattack Exploiting Recent Microsoft vulnerability
  • Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution
  • Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack
  • Adobe’s August 2025 Patch Tuesday

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News