LIVE NEWS
  • Global economy must stop pandering to ‘frivolous desires of ultra-rich’, says UN expert | Environment
  • Some Middle East Flights Resume but Confusion Reigns From Iran Strikes
  • Clinton Deposition Videos Released in Epstein Investigation
  • Elevance stock tumbles as CMS may halt Medicare enrollment
  • Wild spaces for butterflies to be created in Glasgow
  • You can now adjust how your caller card looks for calls on Android phones
  • TRON DAO expands TRON Academy initiative with Dartmouth, Princeton, Oxford, and Cambridge
  • Alex Mitchell: England scrum-half ruled out of Six Nations
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Flaws in Popular IDE Extensions Allow Data Exfiltration
Cybersecurity

Flaws in Popular IDE Extensions Allow Data Exfiltration

primereportsBy primereportsFebruary 23, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Flaws in Popular IDE Extensions Allow Data Exfiltration
Share
Facebook Twitter LinkedIn Pinterest Email


Researchers at OX Security have detected four vulnerabilities in three of the most popular integrated development environments (IDEs) that could lead to cyber-attacks.

In a report published on February 17, OX Security shared details about the four new flaws, including two high-severity and one critical, affecting Microsoft Visual Studio Code (VS Code).

These vulnerabilities also impact Cursor and Windsurf, two forks of VS Code that provide AI-assisted software development tools (aka ‘vibe coding’ platforms).

The affected extensions were collectively downloaded over 128 million times.

The researchers warned that despite disclosing the vulnerabilities to these platforms’ maintainers in July and August 2025 through multiple channels, including direct email, their GitHub pages and social networks, none have yet responded.

Three of the vulnerabilities were disclosed by MITRE on February 16 and allocated a common vulnerabilities and exposures (CVE) identifier.

Vulnerabilities Affecting VS Code and ‘Vibe Coding’ Forks

The vulnerabilities described include:

  • CVE-2025-65717 (CVSS v3.1 score: 9.1) is a vulnerability in the Live Server extension for VS Code – with over 72 million downloads – that allows a remote, unauthenticated attacker to exfiltrate files from a developer’s local machine. OX Security warned that attackers only need to send a malicious link to the victim while Live Server is running in the background to exploit the flaw
  • CVE-2025-65716 (CVSS v3.1 score: 8.8) is a vulnerability in Markdown Preview Enhanced, a VS Code extension with over 8.5 million downloads designed to provide a richer Markdown authoring experience. It allows attackers to exploit how Markdown files preview HTML tags in order to execute arbitrary JavaScript code, which is able to communicate with localhost, allowing maliciously crafted Markdown files to scan the current local network and exfiltrate data to a remote server
  • CVE-2025-65715 (CVSS v3.1 score: 7.8) is a vulnerability in Code Runner – an extension with over 37 million downloads – that allows attackers to execute arbitrary code (RCE) by convincing a user to alter the “settings.json” file through phishing or social engineering
  • A fourth vulnerability in Microsoft Live Preview (over 11 million downloads) allows attackers to access sensitive files on a developer’s machine by tricking a victim into visiting a malicious website when the extension is running, which then enables specially crafted JavaScript requests targeting the localhost to enumerate and exfiltrate sensitive files

While OX Security claims that the first three vulnerabilities remains unpatched, the researchers said Microsoft silently fixed the fourth on in version 0.4.16 of VS Code released in September 2025. MITRE did not disclose the fourth vulnerability and it has not been assigned any CVE identifier.

Recommendations to IDE Users

OX Security said that the research demonstrated that a malicious hacker only needs to exploit a single vulnerability within one extension to perform lateral movement and compromise entire organizations.

These vulnerabilities “expose a critical blind spot in modern development security,” said the researchers.

“While organizations invest heavily in securing production environments, the developer’s local machine remains a largely unprotected gateway to an organization’s most sensitive assets.”

The OX Security report provided two sets of recommendations for IDE and vibe coding tool users to mitigate such vulnerabilities.

The first list of recommendations are workaround implementations in order to keep using the affected extensions without being impacted by potential exploits:

  • Avoid opening untrusted HTML while localhost servers are running
  • Avoid running servers on localhost
  • Avoid applying untrusted configurations. Never paste or run snippets in the global settings.json from emails, chats or unverified sources
  • Restrict extension risk. Only install trusted extensions, and monitor or back up settings.json to detect unexpected changes

In a second list of recommendations, the OX Security researchers outlined some general best practices for protecting IDEs:

  • Disable or uninstall non-essential wxtensions
  • Harden your local network by applying security controls like a well-configured local firewall to restrict inbound and outbound connections for development services
  • Maintain a rigorous update schedule allowing for immediately applying security updates for all software, including IDEs, extensions, operating systems and development dependencies, to address known vulnerabilities quickly

Recommendations to IDE Extension Maintainers

Finally, the researchers also criticized the lack of response from extension maintainers despite months of responsible disclosure attempts through multiple channels.

“It underscores a systemic problem: there is no accountability framework for extension security and no incentive structure to ensure timely remediation of critical vulnerabilities,” they added.

They provided the maintainers of the affected extensions with some solutions to prevent such vulnerabilities to be exploited. These included:

  • Mandatory security review processes before extensions are published to marketplaces, similar to app store vetting
  • Automated vulnerability scanning using AI-powered security testing tools to analyze new extensions before they reach developers
  • Enforceable response requirements for maintainers of popular extensions, including mandatory CVE issuance and patch timelines
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMeta To Launch AI-powered Smartwatch To Complement Ray-Ban Glasses
Next Article BBC presenting duties to be shared for World Cup – but who will host the final? | BBC
primereports
  • Website

Related Posts

Cybersecurity

Samsung Unpacked 2026 live blog: Updates on Galaxy S26 Ultra, preorder deals, and pricing

February 25, 2026
Cybersecurity

Marquis sues SonicWall over backup breach that led to ransomware attack

February 25, 2026
Cybersecurity

Why ‘Call This Number’ TOAD Emails Beat Gateways

February 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20255 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Global economy must stop pandering to ‘frivolous desires of ultra-rich’, says UN expert | Environment
  • Some Middle East Flights Resume but Confusion Reigns From Iran Strikes
  • Clinton Deposition Videos Released in Epstein Investigation
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.