Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Nvidia is the latest investor to support AV startup Nuro with a $203 million funding round

Explain why hackers who exposed the North Korean government did that

UK Industrial Strategy Boosts Science and Technology in Northern Ireland

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New flaws in IDES like Visual Studio code allow malicious extensions to bypass validated status
Identity

New flaws in IDES like Visual Studio code allow malicious extensions to bypass validated status

userBy userJuly 1, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 1, 2025Ravi LakshmananDeveloper Security / Software Development

New investigations in integrated development environments (IDES) such as Microsoft Visual Studio Code, Visual Studio, Intellij Idea, Cursor reveal weaknesses in how the enhanced validation process handles, ultimately allowing attackers to run malicious code on their developer machines.

“The flawed validation checks in Visual Studio code have discovered that publishers can add functionality to their extensions while maintaining their validated icons,” said OX security researchers Nir Zadok and Moshe Siman Tov Bustan in a report shared with Hacker News. “This can create false confidence that malicious extensions may appear to be validated and approved.”

Specifically, the analysis showed that Visual Studio Code sends HTTP POST requests to the domain.[.]com “Determines if the extension is validated.

Cybersecurity

The exploitation method essentially involves creating a malicious extension with the same verifiable value as a validated extension like Microsoft, and bypassing the trust check.

As a result, it can also include code that can run operating system commands, while still appearing to have Rogue Extensions validated to unsuspecting developers.

From a security standpoint, this is a classic case of extensions extending abuse, and the misleading actors distributing plugins outside the official market. Without enforcement or verification of trustworthy publishers signed with the right code, even legal extensions can hide dangerous scripts.

For attackers, this opens a low barrier entry point for achieving remote code execution. This is a particularly serious risk in development environments where sensitive credentials and source code are often accessible.

In the proof of concept (POC), proven by cybersecurity companies, the extension is configured to open computer apps on Windows machines, highlighting the ability to run commands on the underlying host.

I found it possible to create a VSIX package file that will make malicious extensions appear legal by identifying the values ​​used in the verification request and modifying them.

Ox Security said that by changing the values ​​used for validation without checking, it can reproduce defects in other IDEs, such as Intellij ideas and cursors.

In response to responsible disclosure, Microsoft said that the actions are by design and that changes will prevent VSIX extensions from being exposed to the market with enhanced signature verification enabled by default on all platforms.

However, cybersecurity companies discovered that this flaw was recently exploitable on June 29, 2025. Hacker News contacted Microsoft for comment.

Cybersecurity

The findings once again show that relying solely on validated symbols of extensions can be at risk, as attackers can trick developers into running malicious code without knowledge. To mitigate this risk, we recommend installing the extension directly from the official market, rather than using vSix extensions that are shared online.

“The ability to insert malicious code into an extension, package it as a vSIX/zip file, and install it while maintaining the symbols seen on multiple major development platforms poses a serious risk,” the researchers said. “This vulnerability particularly affects developers who install extensions from online resources such as GitHub.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe US Senate removes the controversial “AI Moratrium” from budget bill
Next Article A man’s body raw with parasites after kidney transplant infected at US hospital
user
  • Website

Related Posts

Hackers spreading Agent Tesla, Asyncrat and Snake KeyLogger using the new QuirkyLoader malware

August 21, 2025

Important findings from Blue Report 2025

August 21, 2025

Scattered spider hackers win $13 million in reparations for SIMs replacing Crypto theft for 10 years

August 21, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Nvidia is the latest investor to support AV startup Nuro with a $203 million funding round

Explain why hackers who exposed the North Korean government did that

UK Industrial Strategy Boosts Science and Technology in Northern Ireland

Hackers spreading Agent Tesla, Asyncrat and Snake KeyLogger using the new QuirkyLoader malware

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know

What’s Wrong with the Web? Tim Berners-Lee Speaks Out in Rare Interview

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.