Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

TeamPCP pushes malicious Telnyx version to PyPI and hides stealer in WAV files

Iranian hackers claim to have infiltrated FBI Director Kash Patel’s personal email account

Apple says people using lockdown mode have not been hacked with spyware

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Open bug in VSX allows malicious VS Code extensions to bypass pre-publication security checks
Identity

Open bug in VSX allows malicious VS Code extensions to bypass pre-publication security checks

By March 27, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 27, 2026Software Security/DevSecOps

Cybersecurity researchers have detailed a patched bug that affects Open VSX’s pre-publication scanning pipeline and allows the tool to bypass the review process and publish malicious Microsoft Visual Studio Code (VS Code) extensions to the registry.

“The pipeline had a single Boolean return value that meant both ‘no scanners configured’ and ‘all scanners failed to run,'” Koi Security researcher Oran Simhony said in a report shared with The Hacker News. “The caller couldn’t tell the difference, so when the scanner failed under load, Open VSX treated it as ‘nothing to scan’ and just passed on the extension.”

Early last month, the Eclipse Foundation, which manages Open VSX, announced plans to force pre-publication security checks before publishing VS Code extensions to repositories to address the growing problem of malicious extensions.

Since Open VSX also serves as an extension marketplace for Cursor, Windsurf, and other VS Code forks, this move was seen as a proactive approach to prevent unauthorized extensions from being published in the first place. As part of pre-publication scanning, extensions that fail the process are quarantined for administrator review.

The vulnerability discovered by Koui, codenamed Open Sesame, concerns the way this Java-based service reports scan results. Specifically, this is due to the fact that the scanner incorrectly interprets a scanner job failure because it is not configured, and the extension is marked as a path and is immediately activated and available for download from Open VSX.

At the same time, it can also refer to a scenario where a scanner exists and the scanner job fails and cannot be queued because the database connection pool is exhausted. Even more troubling, the same problem occurred with recovery services designed to retry failed scans, allowing the extension to skip the entire scanning process under certain conditions.

An attacker could exploit this vulnerability by flooding a public endpoint with several malicious .VSIX extensions, potentially starving the database connection pool under concurrent load. This results in a scenario where scan jobs are no longer queued.

What’s notable about this attack is that it does not require any special privileges. A malicious attacker with a free publisher account could reliably trigger this vulnerability to compromise the scanning process and publish extensions. This issue was resolved in Open VSX version 0.32.0 last month following a responsible disclosure on February 8, 2026.

“Pre-publication scanning is an important layer, but it’s one layer,” Coy said. “While the pipeline design is sound, a single Boolean value that cannot distinguish between ‘do nothing’ and ‘something went wrong’ has turned the entire infrastructure into a gate that opens under pressure.”

“This is a common anti-pattern: fail-open error handling hidden behind a code path designed for legitimate ‘do nothing’ cases. If you’re building similar pipelines, make failure conditions explicit. Avoid ‘no work required’ and ‘work failed’ sharing return values.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAitM phishing uses Cloudflare turnstile bypass to target TikTok business accounts
Next Article Apple says people using lockdown mode have not been hacked with spyware

Related Posts

TeamPCP pushes malicious Telnyx version to PyPI and hides stealer in WAV files

March 27, 2026

AitM phishing uses Cloudflare turnstile bypass to target TikTok business accounts

March 27, 2026

Bearlyfy attacks over 70 Russian companies with custom GenieLocker ransomware

March 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

TeamPCP pushes malicious Telnyx version to PyPI and hides stealer in WAV files

Iranian hackers claim to have infiltrated FBI Director Kash Patel’s personal email account

Apple says people using lockdown mode have not been hacked with spyware

Open bug in VSX allows malicious VS Code extensions to bypass pre-publication security checks

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.