Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaws in VS Code Extensions Threaten Developers

Critical Flaws in VS Code Extensions Threaten Developers

Posted on February 20, 2026 By CWS

Three significant security vulnerabilities have been identified in four widely used Visual Studio Code extensions, putting millions of developers at risk. The vulnerabilities, known as CVE-2025-65715, CVE-2025-65716, and CVE-2025-65717, affect extensions with over 128 million downloads collectively.

Security Risks in Developer Tools

The OX Security Research team discovered these vulnerabilities, which were later confirmed on platforms such as Cursor and Windsurf IDEs. This revelation highlights a critical oversight in the security of modern software supply chains: the vulnerability of developers’ own systems.

Integrated Development Environments (IDEs) are crucial for developers, housing sensitive information like business logic, API keys, and customer data. Extensions with extensive system-level permissions could become potential entry points for security breaches.

Details of the Vulnerabilities

Each vulnerability presents unique threats. For instance, CVE-2025-65717, with a CVSS score of 9.1, allows remote file exfiltration via Live Server’s localhost. Similarly, CVE-2025-65716 in Markdown Preview Enhanced, rated 8.8, enables JavaScript execution leading to local port scanning and data extraction. CVE-2025-65715 in Code Runner, with a 7.8 score, poses a risk of remote code execution.

The Microsoft Live Preview extension was found to have an XSS vulnerability, enabling full IDE file exfiltration, which was patched in version 0.4.16 without public acknowledgment to OX Security.

Security Recommendations and Future Measures

OX Security disclosed these issues to the relevant maintainers in mid-2025, but there has been no response, underscoring the lack of accountability in extension security management. They advise developers to scrutinize IDE extensions like third-party software dependencies.

Developers should audit and remove non-essential extensions and avoid running localhost servers unnecessarily. OX Security advocates for mandatory security reviews for marketplace extensions, AI-driven scanning of new submissions, and enforceable patch timelines to mitigate risks.

As reliance on extensions grows, partly due to AI coding tools, the current security model is inadequate, posing an increasing threat to organizations. Robust security measures and accountability are essential to prevent future vulnerabilities.

Cyber Security News Tags:Code Runner, CVE, Cybersecurity, Developer, Extensions, IDE, Live Server, Microsoft, OX Security, Security, software supply chain, VS Code, Vulnerabilities

Post navigation

Previous Post: Apache Tomcat Security Flaw Allows Constraint Bypass
Next Post: Engineers Charged in Silicon Valley Trade Secrets Case

Related Posts

46,000+ Grafana Instances Exposed to Malicious Account Takeover Attacks 46,000+ Grafana Instances Exposed to Malicious Account Takeover Attacks Cyber Security News
AI Assistants Vulnerable to Hidden Memory Manipulations AI Assistants Vulnerable to Hidden Memory Manipulations Cyber Security News
South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims Cyber Security News
Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass Cyber Security News
Attackers Exploiting React2Shell Vulnerability to Attack IT Sectors Attackers Exploiting React2Shell Vulnerability to Attack IT Sectors Cyber Security News
New FortiWeb 0-Day Code Execution Vulnerability Exploited in the Wild New FortiWeb 0-Day Code Execution Vulnerability Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News