Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft To Depreciate VBScript In Windows Warns Developers To Adapt Their Projects

Posted on September 12, 2025September 12, 2025 By CWS

Microsoft has formally introduced a multi-phase plan to deprecate VBScript in Home windows, a transfer that indicators a major shift for builders, significantly these working with Visible Fundamental for Functions (VBA).

The change, first detailed in Could 2024, will regularly section out the legacy scripting language, requiring builders to adapt their tasks to make sure future compatibility.

This choice primarily impacts VBA functions that depend on VBScript for functionalities like executing exterior scripts or using reference libraries, such because the broadly used VBScript.RegExp for dealing with common expressions.

As Home windows evolves, builders are being urged to organize for a future with out VBScript.

The Three-Part Deprecation Timeline

Microsoft has outlined a transparent, three-stage course of for retiring VBScript. The primary section, presently energetic and anticipated to final till at the very least 2026, treats VBScript as a “Characteristic on Demand” (FOD), which means it stays enabled by default, and current VBA tasks will proceed to perform with out interruption.

Within the second section, projected to start round 2027, the VBScript FOD will probably be disabled by default. Whereas directors will nonetheless have the choice to re-enable it, this marks a essential level the place un-updated functions could start to fail.

The ultimate section, with a yet-to-be-determined date, will see VBScript fully faraway from all future Home windows releases, making any remaining dependencies out of date.

The deprecation will have an effect on VBA tasks in two main methods. First, any code that calls and executes exterior .vbs information will not be supported as soon as VBScript is disabled or eliminated.

Second, and extra critically for a lot of, references to the VBScript kind library for normal expressions will break.

This has been a typical methodology for builders to implement sample matching and textual content manipulation inside Workplace functions like Excel, Phrase, and Entry.

With out proactive modifications, these important features will stop to function in newer Home windows environments, probably crippling advanced macros and automatic workflows that depend upon them.

Future-Proofing With Built-in RegExp

To handle this, Microsoft has built-in RegExp lessons instantly into the VBA runtime library, beginning with Microsoft 365 Model 2508 (Construct 19127.20154).

This replace permits builders to make use of common expressions natively with out referencing the exterior vbscript.dll.

The brand new implementation helps each early binding (Dim regEx As RegExp) and late binding (CreateObject(“VBScript.RegExp”)), guaranteeing that up to date Workplace variations can run scripts seamlessly, even on future Home windows variations the place VBScript is absent.

Microsoft strongly recommends that builders improve to the newest Workplace construct, start utilizing the brand new built-in RegExp lessons of their macros, and completely take a look at current tasks to determine and resolve any lingering VBScript dependencies.

Discover this Story Fascinating! Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:Adapt, Depreciate, Developers, Microsoft, Projects, VBScript, Warns, Windows

Post navigation

Previous Post: Why Runtime Visibility Must Take Center Stage
Next Post: Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm

Related Posts

CISA Warns of Git Arbitrary File Write Vulnerability Exploited in Attacks Cyber Security News
Microsoft Teams “couldn’t connect” Error Following Recent Sidebar Update Cyber Security News
Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia Cyber Security News
New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting RDP Cyber Security News
OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data Cyber Security News
ERMAC v3.0 Banking Malware Source Code Exposed via Weak Password Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks
  • In Other News: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Research
  • New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems
  • DELMIA Factory Software Vulnerability Exploited in Attacks
  • Apple Sends Fresh Wave of Spyware Notifications to French Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks
  • In Other News: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Research
  • New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems
  • DELMIA Factory Software Vulnerability Exploited in Attacks
  • Apple Sends Fresh Wave of Spyware Notifications to French Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News