Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

GoWish shopping and wish list app has its biggest year yet

I tried Apple’s crossbody strap. It’s convenient, but if you remove the strap, it looks tacky.

Samsung’s zero-click flaw is exploited to deploy LANDFALL Android spyware via WhatsApp

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New flaws in IDES like Visual Studio code allow malicious extensions to bypass validated status
Identity

New flaws in IDES like Visual Studio code allow malicious extensions to bypass validated status

userBy userJuly 1, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 1, 2025Ravi LakshmananDeveloper Security / Software Development

New investigations in integrated development environments (IDES) such as Microsoft Visual Studio Code, Visual Studio, Intellij Idea, Cursor reveal weaknesses in how the enhanced validation process handles, ultimately allowing attackers to run malicious code on their developer machines.

“The flawed validation checks in Visual Studio code have discovered that publishers can add functionality to their extensions while maintaining their validated icons,” said OX security researchers Nir Zadok and Moshe Siman Tov Bustan in a report shared with Hacker News. “This can create false confidence that malicious extensions may appear to be validated and approved.”

Specifically, the analysis showed that Visual Studio Code sends HTTP POST requests to the domain.[.]com “Determines if the extension is validated.

Cybersecurity

The exploitation method essentially involves creating a malicious extension with the same verifiable value as a validated extension like Microsoft, and bypassing the trust check.

As a result, it can also include code that can run operating system commands, while still appearing to have Rogue Extensions validated to unsuspecting developers.

From a security standpoint, this is a classic case of extensions extending abuse, and the misleading actors distributing plugins outside the official market. Without enforcement or verification of trustworthy publishers signed with the right code, even legal extensions can hide dangerous scripts.

For attackers, this opens a low barrier entry point for achieving remote code execution. This is a particularly serious risk in development environments where sensitive credentials and source code are often accessible.

In the proof of concept (POC), proven by cybersecurity companies, the extension is configured to open computer apps on Windows machines, highlighting the ability to run commands on the underlying host.

I found it possible to create a VSIX package file that will make malicious extensions appear legal by identifying the values ​​used in the verification request and modifying them.

Ox Security said that by changing the values ​​used for validation without checking, it can reproduce defects in other IDEs, such as Intellij ideas and cursors.

In response to responsible disclosure, Microsoft said that the actions are by design and that changes will prevent VSIX extensions from being exposed to the market with enhanced signature verification enabled by default on all platforms.

However, cybersecurity companies discovered that this flaw was recently exploitable on June 29, 2025. Hacker News contacted Microsoft for comment.

Cybersecurity

The findings once again show that relying solely on validated symbols of extensions can be at risk, as attackers can trick developers into running malicious code without knowledge. To mitigate this risk, we recommend installing the extension directly from the official market, rather than using vSix extensions that are shared online.

“The ability to insert malicious code into an extension, package it as a vSIX/zip file, and install it while maintaining the symbols seen on multiple major development platforms poses a serious risk,” the researchers said. “This vulnerability particularly affects developers who install extensions from online resources such as GitHub.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe US Senate removes the controversial “AI Moratrium” from budget bill
Next Article A man’s body raw with parasites after kidney transplant infected at US hospital
user
  • Website

Related Posts

Samsung’s zero-click flaw is exploited to deploy LANDFALL Android spyware via WhatsApp

November 7, 2025

From Log4j to IIS, Chinese hackers turn legacy bugs into global spying tools

November 7, 2025

Logic bomb hidden in malware-laden NuGet package is set to explode several years after installation

November 7, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

GoWish shopping and wish list app has its biggest year yet

I tried Apple’s crossbody strap. It’s convenient, but if you remove the strap, it looks tacky.

Samsung’s zero-click flaw is exploited to deploy LANDFALL Android spyware via WhatsApp

TechCrunch Disrupt 2025 Startup Battlefield 200: Celebrating outstanding achievements

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.