Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs
嗯,用户让我用中文总结一下这篇文章,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我得通读一下这篇文章,理解它的主要内容。 文章讲的是微软Visual Studio Code的四个流行扩展被发现有多个安全漏洞。这些扩展包括Live Server、Code Runner、Markdown Preview Enhanced和Microsoft Live Preview,总安装量超过1.25亿次。漏洞可能导致文件窃取和远程代码执行。OX Security的研究人员指出,黑客只需要一个恶意扩展或一个漏洞就能入侵整个组织。目前除了Microsoft Live Preview在某个版本中被修复外,其他漏洞尚未修补。 接下来,我需要把这些信息浓缩到100字以内。首先提到四个扩展,然后说明它们的安装量和存在的漏洞类型,以及这些漏洞可能带来的风险。最后提到除了其中一个已修复外,其他仍存在风险。 要注意用词简洁明了,避免重复。比如“多个安全漏洞”可以简化为“存在多处漏洞”。同时要确保所有关键点都被涵盖:扩展名称、安装量、漏洞影响、研究人员的警告、修复情况。 现在试着组织语言:四个VS Code扩展(总安装量1.25亿)存在多处漏洞,可能导致文件窃取和远程代码执行。研究人员警告称,这些漏洞可能被用于入侵整个组织。目前除了Microsoft Live Preview已修复外,其他漏洞尚未修补。 检查一下字数是否在100字以内,并确保没有遗漏重要信息。看起来符合要求。 </think> 四个微软VS Code扩展(Live Server、Code Runner、Markdown Preview Enhanced、Microsoft Live Preview)存在多处安全漏洞(总安装量超1.25亿),可能导致本地文件窃取和远程代码执行。研究人员警告称这些漏洞可被用于横向移动并入侵整个组织。目前除Microsoft Live Preview已修复外,其余漏洞尚未修补。 2026-2-18 13:16:0 Author: thehackernews.com(查看原文) 阅读量:1 收藏

Vulnerability / Software Security

Cybersecurity researchers have disclosed multiple security vulnerabilities in four popular Microsoft Visual Studio Code (VS Code) extensions that, if successfully exploited, could allow threat actors to steal local files and execute code remotely.

The extensions, which have been collectively installed more than 125 million times, are Live Server, Code Runner, Markdown Preview Enhanced, and Microsoft Live Preview.

"Our research demonstrates that a hacker needs only one malicious extension, or a single vulnerability within one extension, to perform lateral movement and compromise entire organizations," OX Security researchers Moshe Siman Tov Bustan and Nir Zadok said in a report shared with The Hacker News.

Details of the vulnerabilities are as follows -

  • CVE-2025-65717 (CVSS score: 9.1) - A vulnerability in Live Server that allows attackers to exfiltrate local files, tricking a developer into visiting a malicious website when the extension is running, causing JavaScript embedded in the page to crawl and extract files from the local development HTTP server that runs at localhost:5500, and transmit them to a domain under their control. (Remains unpatched)
  • CVE-2025-65716 (CVSS score: 8.8) - A vulnerability in Markdown Preview Enhanced that allows attackers to execute arbitrary JavaScript code by uploading a crafted markdown (.md) file, allowing local port enumeration and exfiltration to a domain under their control. (Remains unpatched)
  • CVE-2025-65715 (CVSS score: 7.8) - A vulnerability in Code Runner that allows attackers to execute arbitrary code by convincing a user to alter the "settings.json" file through phishing or social engineering. (Remains unpatched)
  • A vulnerability in Microsoft Live Preview allows attackers to access sensitive files on a developer's machine by tricking a victim into visiting a malicious website when the extension is running, which then enables specially crafted JavaScript requests targeting the localhost to enumerate and exfiltrate sensitive files. (No CVE, Fixed silently by Microsoft in version 0.4.16 released in September 2025)

To secure the development environment, it's essential to avoid applying untrusted configurations, disable or uninstall non-essential extensions, harden the local network behind a firewall to restrict inbound and outbound connections, periodically update extensions, and turn off localhost-based services when not in use.

"Poorly written extensions, overly permissive extensions, or malicious ones can execute code, modify files, and allow attackers to take over a machine and exfiltrate information," OX Security said. "Keeping vulnerable extensions installed on a machine is an immediate threat to an organization's security posture: it may take only one click, or a downloaded repository, to compromise everything."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/critical-flaws-found-in-four-vs-code.html
如有侵权请联系:admin#unsafe.sh