Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CISA adds actively exploited VMware Aria operational flaw CVE-2026-22719 to KEV catalog

Why are AI startups selling the same stock at two different prices?

A series of government hacking tools targeting iPhones are being used by cybercriminals

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Critical Open VSX Registry Flaws expose millions of developers to supply chain attacks
Identity

Critical Open VSX Registry Flaws expose millions of developers to supply chain attacks

userBy userJune 26, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 26, 2025Ravi LakshmananOpen Source/Vulnerability

Cybersecurity researchers revealed a critical vulnerability in the open VSX registry (“Open-VSX”)[.]org”) It could have hopefully been that attackers could have controlled the entire Visual Studio code extension market and pose serious supply chain risks.

“The vulnerability allows attackers to take full control of the entire expansion market, thus allowing them to have full control over millions of developer machines,” said Oren Yomtov, a security researcher at Koi. “By taking advantage of CI issues, malicious actors can publish malicious updates to all open vsx extensions.”

Following the responsible disclosure on May 4, 2025, multiple rounds of revision were proposed by the maintainers before it was finally unfolded on June 25th.

Cybersecurity

The Open VSX registry is an open source project and replaces the Visual Studio Marketplace. Maintained by the Eclipse Foundation. Code editors such as Cursor, Windsurf, Google Cloud Shell Editor, and GitPod are integrated into the services.

“This broad adoption means that the open vsx compromise is a nightmare scenario for the supply chain,” Yomtov said. “Every time an extension is installed, or whenever an extension is quietly fetched in the background, these actions go through open VSX.”

The vulnerabilities discovered by KOI Security are rooted in the Publish-Extensions repository. This includes scripts that expose open source and code extensions to Open-VSX.org.

Developers can request that the extension be automatically published by submitting a pull request to add it to the extensions.json file that resides in the repository. Then it will be approved and merged.

In the backend, this unfolds in the form of a GitHub action workflow that runs daily at 03:03 AM UTC.

“This workflow runs with privileged credentials that include the Secret Token (OVSX_PAT) of the @Open-VSX service account. “In theory, only trusted code should see that token.”

“The root of the vulnerability is that the NPM installation provides access to the OVSX_PAT environment variable while running any build scripts for all automatically published extensions and their dependencies.”

Cybersecurity

This means gaining access to the tokens of your @Open-VSX account, allowing privileged access to the open VSX registry, exposes new extensions to attackers, and providing the ability to tamper with existing extensions and inject malicious code.

As of April 2025, the risks posed by extensions have not been noticed by MITRES, which introduced a new “IDE extension” approach to the ATT & CK framework. It says it could be abused by malicious actors to establish permanent access to the victim system.

“All market items are potential backdoors,” Yomtov said. “They are unmoving software dependencies with privileged access and deserve the same diligence as Pypi, NPM, Hugginface, or Github packages.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHomeland Security warns about Iran-backed cyberattacks targeting US networks
Next Article Elon Musk reportedly fires Tesla’s top sales executive
user
  • Website

Related Posts

CISA adds actively exploited VMware Aria operational flaw CVE-2026-22719 to KEV catalog

March 4, 2026

Fake tech support spam deploys customized Havoc C2 across organization

March 3, 2026

The 3 Steps CISOs Must Follow

March 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CISA adds actively exploited VMware Aria operational flaw CVE-2026-22719 to KEV catalog

Why are AI startups selling the same stock at two different prices?

A series of government hacking tools targeting iPhones are being used by cybercriminals

Alibaba’s Qwen technology chief resigns amid massive AI push

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.