Critical VS Code Extension Vulnerabilities Expose 128 Million Developer Machines to Attack


Three critical vulnerabilities hit four popular VS Code extensions with 128 million downloads. CVE-2025-65715, CVE-2025-65716, and CVE-2025-65717 allow remote code execution, file exfiltration, and network scanning. OX Security found these flaws threaten developer laptops holding API keys, source code, and database configs.

Developer machines sit outside traditional defenses. IDE extensions run with full system access. One bad extension reads all files, runs commands, or phones home. Live Server alone has 72 million installs. Attackers need no phishing. Compromise one developer and pivot to corporate networks.

OX Security disclosed flaws responsibly in July-August 2025. Most maintainers stayed silent. Microsoft quietly patched Live Preview XSS without CVE or credit. No marketplace enforces security reviews or patch deadlines.

CVE records confirm severity scores:

Vulnerable Extensions

CVE IDExtensionCVSSDownloadsImpactStatus
CVE-2025-65717Live Server9.172M+Remote file exfiltrationAll versions
CVE-2025-65715Code Runner7.837M+Remote code executionAll versions
CVE-2025-65716Markdown Preview Enhanced8.88.5M+JS execution, port scan, exfilAll versions
NoneMicrosoft Live PreviewN/A11M+XSS to full IDE exfiltrationFixed v0.4.16+

Total exposure: 128.5 million installs.

Attack Capabilities

Each flaw grants attackers:

  • Full filesystem read access to source code, configs, .env files.
  • Arbitrary command execution as logged-in developer.
  • Local network discovery and lateral movement.
  • Data exfiltration over localhost tunnels.

No antivirus flags extension activity.

Live Server CVE-2025-65717 Breakdown

CVSS 9.1 Critical. Attack sequence:

  1. Developer runs Live Server (localhost:5500).
  2. Visits crafted external page with img src=localhost:5500/.ssh/id_rsa.
  3. Server reflects file contents to attacker’s domain.

72 million users run this daily.

Code Runner CVE-2025-65715 Details

37 million downloads. Remote code execution via:

  • Malicious workspace settings.json.
  • Extension executes code from untrusted snippets.
  • Runs as developer user context.

Perfect for supply chain attacks.

Immediate Mitigation Steps

Organizations must act now:

  • Inventory all VS Code extensions across developer endpoints.
  • Remove/disable Live Server, Code Runner, Markdown Preview Enhanced.
  • Disable localhost servers when not coding.
  • Block extensions writing to sensitive directories.
  • Audit settings.json from email/chat sources.

Deploy via Intune or Jamf policies.

Extension Security Checklist

ControlStatus Check
Non-essential extensionsRemoved
Localhost serversDisabled when idle
settings.json sourcesTrusted repositories only
Extension permissionsMinimal required scopes
Marketplace monitoringBlock known malicious publishers

Industry-Wide Risks

Developers hold golden keys to:

  • Source code repositories.
  • CI/CD pipelines.
  • Cloud IAM credentials.
  • Production database access.

One extension flaw equals organization compromise.

Platform Recommendations

OX Security demands marketplace reforms:

  • Mandatory security scans before publishing.
  • CVSS scoring for all extensions.
  • 30-day patch deadlines for critical flaws.
  • Publisher verification and reputation scores.

AI coding agents accelerate extension sprawl.

FAQ

Which VS Code extensions have critical vulnerabilities?

Live Server (CVE-2025-65717), Code Runner (CVE-2025-65715), Markdown Preview Enhanced (CVE-2025-65716).

How many downloads do vulnerable extensions have?

128 million combined across four extensions.

What is the worst vulnerability found?

CVE-2025-65717 Live Server: CVSS 9.1 remote file exfiltration.

Did Microsoft issue CVE for Live Preview flaw?

No CVE issued. Patched silently in v0.4.16.

How do attackers exploit Code Runner CVE?

Malicious settings.json triggers arbitrary code execution.

What should organizations do immediately?

Audit extensions, disable localhost servers, remove non-essential plugins.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages