By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status
Tech News

New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status

By Viral Trending Content 4 Min Read
Share
SHARE

Jul 01, 2025Ravie LakshmananDeveloper Security / Software Development

A new study of integrated development environments (IDEs) like Microsoft Visual Studio Code, Visual Studio, IntelliJ IDEA, and Cursor has revealed weaknesses in how they handle the extension verification process, ultimately enabling attackers to execute malicious code on developer machines.

“We discovered that flawed verification checks in Visual Studio Code allow publishers to add functionality to extensions while maintaining the verified icon,” OX Security researchers Nir Zadok and Moshe Siman Tov Bustan said in a report shared with The Hacker News. “This results in the potential for malicious extensions to appear verified and approved, creating a false sense of trust.”

Specifically, the analysis found that Visual Studio Code sends an HTTP POST request to the domain “marketplace.visualstudio[.]com” to determine if an extension is verified or otherwise.

Cybersecurity

The exploitation method essentially involves creating a malicious extension with the same verifiable values as an already verified extension, such as that of Microsoft, and bypassing trust checks.

As a result, it allows rogue extensions to appear verified to unsuspecting developers, while also containing code capable of executing operating system commands.

From a security standpoint, this is a classic case of extension sideloading abuse, where bad actors distribute plugins outside the official marketplace. Without proper code signing enforcement or trusted publisher verification, even legitimate-looking extensions can hide dangerous scripts.

For attackers, this opens up a low-barrier entry point to achieve remote code execution—a risk that’s especially serious in development environments where sensitive credentials and source code are often accessible.

In a proof-of-concept (PoC) demonstrated by the cybersecurity company, the extension was configured to open the Calculator app on a Windows machine, thereby highlighting its ability to execute commands on the underlying host.

By identifying the values used in verification requests and modifying them, it was found that it’s possible to create a VSIX package file such that it causes the malicious extension to appear legitimate.

OX Security said it was able to reproduce the flaw across other IDEs like IntelliJ IDEA and Cursor by modifying the values used for verification without making them lose their verified status.

In response to responsible disclosures, Microsoft said the behavior is by design and that the changes will prevent the VSIX extension from being published to the Marketplace owing to extension signature verification that’s enabled by default across all platforms.

However, the cybersecurity company found the flaw to be exploitable as recently as June 29, 2025. The Hacker News has reached out to Microsoft for comment, and we will update the story if we hear back.

Cybersecurity

The findings once again show that relying solely on the verified symbol of extensions can be risky, as attackers can trick developers into running malicious code without their knowledge. To mitigate such risks, it’s advised to install extensions directly from official marketplaces as opposed to using VSIX extension files shared online.

“The ability to inject malicious code into extensions, package them as VSIX/ZIP files, and install them while maintaining the verified symbols across multiple major development platforms poses a serious risk,” the researchers said. “This vulnerability particularly impacts developers who install extensions from online resources such as GitHub.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Honor Magic V5 Foldable Specs Officially Revealed

Hydrow Discount Code: Save Up to $150 in July

eir Achieves 99% 5G Coverage as Network Traffic Surges by 60% Year-on-Year

Top 5 Upgrades of the Google Pixel 10 Pro XL

North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

TAGGED: Cyber Security, Cybersecurity, Developer Security, Internet, Microsoft, software development, Software Integrity, Visual Studio Code
Share This Article
Facebook Twitter Copy Link
Previous Article 2 Strong Buy dividend shares to consider in July
Next Article The Best Hot Dog Cookers for All-American Hot Dogging (2025)
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

US airstrikes set back Iran’s nuclear programme by ‘one or two years’, Pentagon says
World News
Ripple Joins Ranks Of Crypto Companies Seeking Banking Licenses In The US
Crypto
India’s macro setup stable, but markets await earnings firepower: Hemang Jani
Business
Mecha BREAK Peaks at Nearly 133,000 Concurrent Players on Steam at Launch
Gaming News
Honor Magic V5 Foldable Specs Officially Revealed
Tech News
Hydrow Discount Code: Save Up to $150 in July
Tech News
Clayton Kershaw, a throwback to baseball's past, could be the last to 3,000 strikeouts
Sports

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

US airstrikes set back Iran’s nuclear programme by ‘one or two years’, Pentagon says

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
US airstrikes set back Iran’s nuclear programme by ‘one or two years’, Pentagon says
July 3, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?