CVE-2022-35975: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in weaveworks vscode-gitops-tools
The GitOps Tools Extension for VSCode can make it easier to manage Flux objects. A specially crafted Flux object may allow for remote code execution in the machine running the extension, in the context of the user that is running VSCode. Users using the VSCode extension to manage clusters that are shared amongst other users are affected by this issue. The only safe mitigation is to update to the latest version of the extension.
AI Analysis
Technical Summary
CVE-2022-35975 is an OS command injection vulnerability (CWE-78) found in the weaveworks vscode-gitops-tools extension for Visual Studio Code. This extension facilitates the management of Flux objects, which are used in GitOps workflows to automate Kubernetes cluster configurations. The vulnerability arises because the extension improperly neutralizes special elements in user-supplied Flux objects, allowing an attacker to craft malicious Flux manifests that, when processed by the extension, result in arbitrary OS command execution on the host machine running VSCode. The execution context is that of the user running the VSCode instance, meaning the attacker gains the same privileges as the user. This flaw affects versions from 0.7.0 up to and including 0.20.2 of the extension. The vulnerability is particularly critical in environments where multiple users share access to Kubernetes clusters managed via this extension, as a malicious Flux object could be introduced by one user to compromise others. No known exploits have been reported in the wild, and the only effective mitigation is to update the extension to a patched version beyond 0.20.2. Since the extension operates within the developer's environment, exploitation requires that the victim opens or interacts with a malicious Flux object, implying some level of user interaction. However, the impact of successful exploitation is significant, enabling remote code execution on the local machine, potentially leading to data compromise, lateral movement, or further network intrusion.
Potential Impact
For European organizations, especially those heavily invested in Kubernetes and GitOps workflows, this vulnerability poses a tangible risk. Organizations using the vscode-gitops-tools extension to manage shared clusters could face unauthorized code execution leading to compromise of developer workstations and potentially the broader network if the attacker escalates privileges or moves laterally. This could result in theft or manipulation of sensitive data, disruption of development pipelines, and erosion of trust in infrastructure automation. Given the extension runs with user-level privileges, the attacker’s ability to cause damage depends on the user's permissions, but many development environments have access to critical source code and deployment credentials. The risk is amplified in collaborative environments common in European tech sectors, including financial services, manufacturing, and public sector entities that rely on Kubernetes for cloud-native deployments. Additionally, the vulnerability could be exploited to implant persistent backdoors or disrupt supply chain integrity, which is a growing concern in Europe’s cybersecurity landscape.
Mitigation Recommendations
The primary and most effective mitigation is to update the vscode-gitops-tools extension to the latest version beyond 0.20.2 where this vulnerability is patched. Organizations should enforce strict extension update policies and monitor for outdated versions. Additionally, implement the following practical controls: 1) Restrict cluster management permissions to trusted users only, minimizing exposure to malicious Flux objects. 2) Employ code review and validation processes for Flux manifests before they are applied or opened in VSCode, potentially using automated scanning tools to detect suspicious payloads. 3) Use containerized or sandboxed development environments to limit the impact of any code execution on the host system. 4) Educate developers about the risks of opening untrusted Flux objects and encourage vigilance against social engineering attempts. 5) Monitor endpoint behavior for unusual command execution patterns that may indicate exploitation attempts. 6) Integrate security tools that can detect anomalous VSCode extension activities or OS-level command executions triggered by developer tools.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Ireland, Poland
CVE-2022-35975: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in weaveworks vscode-gitops-tools
Description
The GitOps Tools Extension for VSCode can make it easier to manage Flux objects. A specially crafted Flux object may allow for remote code execution in the machine running the extension, in the context of the user that is running VSCode. Users using the VSCode extension to manage clusters that are shared amongst other users are affected by this issue. The only safe mitigation is to update to the latest version of the extension.
AI-Powered Analysis
Technical Analysis
CVE-2022-35975 is an OS command injection vulnerability (CWE-78) found in the weaveworks vscode-gitops-tools extension for Visual Studio Code. This extension facilitates the management of Flux objects, which are used in GitOps workflows to automate Kubernetes cluster configurations. The vulnerability arises because the extension improperly neutralizes special elements in user-supplied Flux objects, allowing an attacker to craft malicious Flux manifests that, when processed by the extension, result in arbitrary OS command execution on the host machine running VSCode. The execution context is that of the user running the VSCode instance, meaning the attacker gains the same privileges as the user. This flaw affects versions from 0.7.0 up to and including 0.20.2 of the extension. The vulnerability is particularly critical in environments where multiple users share access to Kubernetes clusters managed via this extension, as a malicious Flux object could be introduced by one user to compromise others. No known exploits have been reported in the wild, and the only effective mitigation is to update the extension to a patched version beyond 0.20.2. Since the extension operates within the developer's environment, exploitation requires that the victim opens or interacts with a malicious Flux object, implying some level of user interaction. However, the impact of successful exploitation is significant, enabling remote code execution on the local machine, potentially leading to data compromise, lateral movement, or further network intrusion.
Potential Impact
For European organizations, especially those heavily invested in Kubernetes and GitOps workflows, this vulnerability poses a tangible risk. Organizations using the vscode-gitops-tools extension to manage shared clusters could face unauthorized code execution leading to compromise of developer workstations and potentially the broader network if the attacker escalates privileges or moves laterally. This could result in theft or manipulation of sensitive data, disruption of development pipelines, and erosion of trust in infrastructure automation. Given the extension runs with user-level privileges, the attacker’s ability to cause damage depends on the user's permissions, but many development environments have access to critical source code and deployment credentials. The risk is amplified in collaborative environments common in European tech sectors, including financial services, manufacturing, and public sector entities that rely on Kubernetes for cloud-native deployments. Additionally, the vulnerability could be exploited to implant persistent backdoors or disrupt supply chain integrity, which is a growing concern in Europe’s cybersecurity landscape.
Mitigation Recommendations
The primary and most effective mitigation is to update the vscode-gitops-tools extension to the latest version beyond 0.20.2 where this vulnerability is patched. Organizations should enforce strict extension update policies and monitor for outdated versions. Additionally, implement the following practical controls: 1) Restrict cluster management permissions to trusted users only, minimizing exposure to malicious Flux objects. 2) Employ code review and validation processes for Flux manifests before they are applied or opened in VSCode, potentially using automated scanning tools to detect suspicious payloads. 3) Use containerized or sandboxed development environments to limit the impact of any code execution on the host system. 4) Educate developers about the risks of opening untrusted Flux objects and encourage vigilance against social engineering attempts. 5) Monitor endpoint behavior for unusual command execution patterns that may indicate exploitation attempts. 6) Integrate security tools that can detect anomalous VSCode extension activities or OS-level command executions triggered by developer tools.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3b6a
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/22/2025, 11:49:42 PM
Last updated: 2/4/2026, 9:15:11 PM
Views: 95
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-2134: CWE-410 in IBM Jazz Reporting Service
LowCVE-2025-27550: CWE-497 in IBM Jazz Reporting Service
LowCVE-2025-1823: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Jazz Reporting Service
LowCVE-2024-39724: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Db2 Big SQL on Cloud Pak for Data
MediumCVE-2026-25512: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Intermesh groupoffice
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.