Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Open VSX Bug Fixed in VS Code Extension Security

Critical Open VSX Bug Fixed in VS Code Extension Security

Posted on March 27, 2026 By CWS

Researchers have recently unveiled a significant security vulnerability within the Open VSX pre-publish scanning tool, which has since been addressed. This flaw previously enabled harmful Microsoft Visual Studio Code (VS Code) extensions to bypass security screenings and become publicly available in the registry. Koi Security’s Oran Simhony detailed in a report to The Hacker News that the issue arose from the scanning pipeline’s single boolean return value, which ambiguously indicated either no scanners were configured or all failed to execute.

Vulnerability Details and Impact

Last month, the Eclipse Foundation, responsible for Open VSX, announced new security checks for VS Code extensions to counteract the threat of malicious extensions. Open VSX serves as the marketplace for Cursor, Windsurf, and other VS Code variants, and the implementation of these checks was seen as a crucial step toward enhancing security. However, the flaw, dubbed ‘Open Sesame,’ allowed extensions to pass as successful even when scanner jobs encountered failures, rendering the extensions downloadable from Open VSX.

The flaw also highlighted issues with database connection pool exhaustion, preventing scanner jobs from queuing. Furthermore, a recovery service designed to retry failed scans suffered from the same misinterpretation, allowing extensions to bypass the scan entirely under certain conditions.

Exploitation and Mitigation

Exploiting this vulnerability did not require special access, as individuals with a free publisher account could exploit it to publish malicious extensions. By overwhelming the publish endpoint with .VSIX extensions, attackers could exhaust the database resources, causing scanning failures. The Eclipse Foundation addressed this issue in Open VSX version 0.32.0, following responsible disclosure on February 8, 2026.

Koi Security emphasized that while pre-publish scanning is vital, the problem lay in the pipeline design, where a single boolean was unable to differentiate between ‘no action required’ and ‘action failed,’ effectively compromising the infrastructure under stress.

Lessons and Future Outlook

The incident underscores a common software design flaw: fail-open error handling disguised as a legitimate ‘nothing to do’ scenario. Koi Security advises developers creating similar pipelines to explicitly define failure states to avoid conflating ‘no work needed’ with ‘work failed.’ This approach can prevent vulnerabilities from being exploited under pressure.

As industries increasingly rely on digital marketplaces, ensuring robust security measures is paramount. The prompt resolution of the Open VSX vulnerability serves as a reminder of the ongoing need for vigilance and proactive security practices in software development.

The Hacker News Tags:Cybersecurity, DevSecOps, Eclipse Foundation, Koi Security, malicious extensions, Open VSX, pre-publish scanning, security vulnerability, Software Security, VS Code

Post navigation

Previous Post: Silver Fox Targets Japanese Firms with Tax Phishing Scheme
Next Post: Critical Malware Alert for Popular Linux Compression Tool

Related Posts

Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing The Hacker News
Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi The Hacker News
Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows The Hacker News
Why the New AI Browsers War is a Nightmare for Security Teams Why the New AI Browsers War is a Nightmare for Security Teams The Hacker News
AI Security Lags Behind as Skills Fail to Evolve AI Security Lags Behind as Skills Fail to Evolve The Hacker News
ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious Telnyx Versions on PyPI: Audio Steganography Attack
  • Critical Flaw in Kea DHCP Poses Remote Crash Risk
  • Pro-Iranian Group Hacks FBI Director’s Account
  • Critical Malware Alert for Popular Linux Compression Tool
  • Critical Open VSX Bug Fixed in VS Code Extension Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious Telnyx Versions on PyPI: Audio Steganography Attack
  • Critical Flaw in Kea DHCP Poses Remote Crash Risk
  • Pro-Iranian Group Hacks FBI Director’s Account
  • Critical Malware Alert for Popular Linux Compression Tool
  • Critical Open VSX Bug Fixed in VS Code Extension Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark