Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-62222

Опубликовано: 11 нояб. 2025
Источник: msrc
CVSS3: 8.8
EPSS Низкий

Описание

Agentic AI and Visual Studio Code Remote Code Execution Vulnerability

Improper neutralization of special elements used in a command ('command injection') in Visual Studio Code CoPilot Chat Extension allows an unauthorized attacker to execute code over a network.

FAQ

According to the CVSS metric, the attack vector is network (AV:N) and user interaction is required (UI:R). What is the target context of the remote code execution?

A remote (AV:N) attacker could create a specially crafted GitHub issue within a user's repository. To exploit this, the user must enable a particular mode on the attacker’s crafted issue, which would execute the issue’s description and enable remote code execution by the attacker.

Обновления

ПродуктСтатьяОбновление
Microsoft Visual Studio Code CoPilot Chat Extension

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

EPSS

Процентиль: 44%
0.00215
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
3 месяца назад

Improper neutralization of special elements used in a command ('command injection') in Visual Studio Code CoPilot Chat Extension allows an unauthorized attacker to execute code over a network.

CVSS3: 8.8
github
3 месяца назад

Improper neutralization of special elements used in a command ('command injection') in Visual Studio Code CoPilot Chat Extension allows an unauthorized attacker to execute code over a network.

CVSS3: 6.7
fstec
3 месяца назад

Уязвимость программного обеспечения Microsoft Visual Studio Code CoPilot Chat Extension, связанная с непринятием мер по очистке данных на управляющем уровне, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 44%
0.00215
Низкий

8.8 High

CVSS3