Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Langchain is about to become a unicorn, sources say

Hackers use leaked shelter tool licenses to spread Lumma Stealer and Sectoprat malware

Anatsa Android Banking Trojan hits 90,000 users with fake PDF apps on Google Play

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New flaws in IDES like Visual Studio code allow malicious extensions to bypass validated status
Identity

New flaws in IDES like Visual Studio code allow malicious extensions to bypass validated status

userBy userJuly 1, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 1, 2025Ravi LakshmananDeveloper Security / Software Development

New investigations in integrated development environments (IDES) such as Microsoft Visual Studio Code, Visual Studio, Intellij Idea, Cursor reveal weaknesses in how the enhanced validation process handles, ultimately allowing attackers to run malicious code on their developer machines.

“The flawed validation checks in Visual Studio code have discovered that publishers can add functionality to their extensions while maintaining their validated icons,” said OX security researchers Nir Zadok and Moshe Siman Tov Bustan in a report shared with Hacker News. “This can create false confidence that malicious extensions may appear to be validated and approved.”

Specifically, the analysis showed that Visual Studio Code sends HTTP POST requests to the domain.[.]com “Determines if the extension is validated.

Cybersecurity

The exploitation method essentially involves creating a malicious extension with the same verifiable value as a validated extension like Microsoft, and bypassing the trust check.

As a result, it can also include code that can run operating system commands, while still appearing to have Rogue Extensions validated to unsuspecting developers.

From a security standpoint, this is a classic case of extensions extending abuse, and the misleading actors distributing plugins outside the official market. Without enforcement or verification of trustworthy publishers signed with the right code, even legal extensions can hide dangerous scripts.

For attackers, this opens a low barrier entry point for achieving remote code execution. This is a particularly serious risk in development environments where sensitive credentials and source code are often accessible.

In the proof of concept (POC), proven by cybersecurity companies, the extension is configured to open computer apps on Windows machines, highlighting the ability to run commands on the underlying host.

I found it possible to create a VSIX package file that will make malicious extensions appear legal by identifying the values ​​used in the verification request and modifying them.

Ox Security said that by changing the values ​​used for validation without checking, it can reproduce defects in other IDEs, such as Intellij ideas and cursors.

In response to responsible disclosure, Microsoft said that the actions are by design and that changes will prevent VSIX extensions from being exposed to the market with enhanced signature verification enabled by default on all platforms.

However, cybersecurity companies discovered that this flaw was recently exploitable on June 29, 2025. Hacker News contacted Microsoft for comment.

Cybersecurity

The findings once again show that relying solely on validated symbols of extensions can be at risk, as attackers can trick developers into running malicious code without knowledge. To mitigate this risk, we recommend installing the extension directly from the official market, rather than using vSix extensions that are shared online.

“The ability to insert malicious code into an extension, package it as a vSIX/zip file, and install it while maintaining the symbols seen on multiple major development platforms poses a serious risk,” the researchers said. “This vulnerability particularly affects developers who install extensions from online resources such as GitHub.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe US Senate removes the controversial “AI Moratrium” from budget bill
Next Article A man’s body raw with parasites after kidney transplant infected at US hospital
user
  • Website

Related Posts

Hackers use leaked shelter tool licenses to spread Lumma Stealer and Sectoprat malware

July 8, 2025

Anatsa Android Banking Trojan hits 90,000 users with fake PDF apps on Google Play

July 8, 2025

Malicious Pull Request Targets Over 6,000 Developers Target via Vulnerable Escode vs Code Extensions

July 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Langchain is about to become a unicorn, sources say

Hackers use leaked shelter tool licenses to spread Lumma Stealer and Sectoprat malware

Anatsa Android Banking Trojan hits 90,000 users with fake PDF apps on Google Play

The latest update for Mastodon prepares quote posts, Revamps Design app

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.