Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Security Risks in Popular VS Code Extensions Identified

Security Risks in Popular VS Code Extensions Identified

Posted on February 18, 2026 By CWS

In a recent revelation, cybersecurity experts have uncovered significant security vulnerabilities in four widely used Microsoft Visual Studio Code (VS Code) extensions. These flaws, if exploited, could enable malicious actors to steal sensitive local files and execute unauthorized code remotely. The affected extensions, installed over 125 million times collectively, include Live Server, Code Runner, Markdown Preview Enhanced, and Microsoft Live Preview.

Critical Vulnerabilities Discovered

Security researchers from OX Security, Moshe Siman Tov Bustan and Nir Zadok, highlighted the potential impact of these vulnerabilities. Their report indicates that a single compromised extension or vulnerability can lead to widespread organizational security breaches. The vulnerabilities identified present a severe risk, with the potential to allow attackers to perform lateral movement within networks.

The details of these vulnerabilities are alarming. One such flaw, identified as CVE-2025-65717 with a CVSS score of 9.1, exists in the Live Server extension. This vulnerability can be exploited by deceiving developers into visiting malicious websites, leading to the exfiltration of local files. Similarly, CVE-2025-65716, affecting Markdown Preview Enhanced, allows arbitrary JavaScript code execution through crafted markdown files. Both vulnerabilities remain unpatched.

Impact on Development Environments

The vulnerabilities extend to Code Runner, with CVE-2025-65715 scoring 7.8 on the CVSS scale. Attackers can exploit this by manipulating the “settings.json” file, often through phishing tactics, to execute arbitrary code. The Microsoft Live Preview extension also contained a vulnerability that exposed sensitive files through malicious webpage visits, although it was discreetly patched in version 0.4.16 released in September 2025.

Such security lapses underscore the importance of maintaining a secure development environment. Developers are advised to avoid using untrusted configurations, disable or uninstall unnecessary extensions, and strengthen local network security with firewalls. Regular updates of extensions and disabling localhost services when not in use are also recommended to mitigate risks.

Recommendations for Developers

OX Security emphasizes the danger posed by poorly written or overly permissive extensions. These can permit code execution and file modifications, thereby enabling attackers to gain control over machines and extract critical information. The presence of vulnerable extensions represents an immediate threat to organizational security, as even a single click or downloaded repository can lead to comprehensive system compromise.

In conclusion, staying vigilant and proactive about extension security is crucial for developers. As these vulnerabilities remain a threat, implementing robust security measures is essential to safeguard development environments from potential exploitation.

The Hacker News Tags:Code Runner, Cybersecurity, Extensions, Live Server, Markdown Preview, Microsoft Live Preview, Security, Software Security, VS Code, Vulnerabilities

Post navigation

Previous Post: CISA Urges Action on Windows ActiveX RCE Flaw
Next Post: Critical Vulnerabilities in PDF Platforms Addressed by Foxit and Apryse

Related Posts

A 24-Hour Timeline of a Modern Stealer Campaign A 24-Hour Timeline of a Modern Stealer Campaign The Hacker News
Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries The Hacker News
React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors The Hacker News
Impact of Cloud Outages on Digital Infrastructure Impact of Cloud Outages on Digital Infrastructure The Hacker News
Google’s August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild Google’s August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild The Hacker News
Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kickstart Your Intelligent Workflow Program with 3 Key Strategies
  • MetaMask Phishing Scam Uses Fake Security Reports
  • Cogent Secures $42M to Enhance AI for Vulnerability Management
  • Navigating Cybersecurity Amidst Constant Instability
  • Critical Zero-Day Flaws in PDF Software Risk Data Exposure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Kickstart Your Intelligent Workflow Program with 3 Key Strategies
  • MetaMask Phishing Scam Uses Fake Security Reports
  • Cogent Secures $42M to Enhance AI for Vulnerability Management
  • Navigating Cybersecurity Amidst Constant Instability
  • Critical Zero-Day Flaws in PDF Software Risk Data Exposure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News