Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65715: n/a

0
High
VulnerabilityCVE-2025-65715cvecve-2025-65715
Published: Mon Feb 16 2026 (02/16/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-65715 is a vulnerability in the Code Runner extension (v0. 12. 2) for Visual Studio Code that allows attackers to execute arbitrary code by opening a specially crafted workspace. This occurs due to improper handling of the code-runner. executorMap setting, which can be manipulated to run malicious commands. Exploitation requires the victim to open a malicious workspace, enabling code execution without prior authentication. No known exploits are currently in the wild, and no CVSS score has been assigned. The vulnerability poses a significant risk to developers and organizations using this extension, potentially compromising confidentiality, integrity, and availability of systems. European organizations relying on Visual Studio Code with this extension are at risk, especially in countries with high developer activity and software industry presence. Mitigation involves updating or disabling the vulnerable extension, restricting workspace sources, and applying strict code execution policies.

AI-Powered Analysis

AILast updated: 02/17/2026, 08:25:18 UTC

Technical Analysis

CVE-2025-65715 is a security vulnerability identified in the Code Runner extension version 0.12.2 for Visual Studio Code. The flaw resides in the code-runner.executorMap setting, which defines how code snippets are executed within the editor. An attacker can craft a malicious workspace configuration that manipulates this setting to execute arbitrary commands on the victim’s machine when the workspace is opened. This vulnerability effectively allows remote code execution (RCE) without requiring authentication, relying solely on user interaction to open a malicious workspace file. The absence of a CVSS score indicates that the vulnerability has not yet been fully assessed, but the nature of the flaw suggests a critical security risk. No patches or fixes have been publicly disclosed, and no known exploits are currently reported in the wild. The vulnerability impacts the confidentiality, integrity, and availability of affected systems, as arbitrary code execution can lead to data theft, system compromise, or disruption of services. Since Visual Studio Code is widely used by developers globally, including in Europe, this vulnerability could be leveraged to target development environments, supply chains, or internal networks. The attack vector is primarily social engineering or supply chain compromise, where an attacker convinces a user to open a malicious workspace. This vulnerability highlights the risks of extension configurations that allow execution of arbitrary commands without sufficient validation or sandboxing.

Potential Impact

For European organizations, the impact of CVE-2025-65715 could be substantial, particularly for those with large software development teams or those relying heavily on Visual Studio Code and its extensions. Successful exploitation could lead to unauthorized code execution on developer machines, potentially allowing attackers to steal sensitive intellectual property, inject malicious code into software projects, or gain footholds within corporate networks. This could result in data breaches, supply chain compromises, and disruption of development workflows. Organizations in sectors such as finance, technology, and critical infrastructure, where software integrity is paramount, are especially at risk. The vulnerability also poses risks to managed service providers and software vendors operating in Europe, as compromised development environments could propagate malicious code to downstream customers. Given the ease of exploitation (requiring only opening a crafted workspace) and the potential for widespread impact, European organizations must prioritize mitigation to prevent exploitation and limit exposure.

Mitigation Recommendations

To mitigate CVE-2025-65715, European organizations should take the following specific actions: 1) Immediately audit and identify all instances of the Code Runner extension version 0.12.2 in use across development environments. 2) Disable or uninstall the vulnerable extension until a patch or update is released by the vendor. 3) Restrict the sources of workspace files to trusted repositories and networks, implementing policies to prevent opening untrusted or unsolicited workspace configurations. 4) Educate developers and users about the risks of opening unknown or suspicious workspace files, emphasizing cautious handling of external code and configurations. 5) Implement endpoint protection solutions that monitor and block unauthorized code execution triggered by editor extensions. 6) Employ application whitelisting and sandboxing techniques to limit the impact of any arbitrary code execution. 7) Monitor for unusual activity on developer machines, including unexpected command executions or network connections. 8) Stay informed about vendor updates and apply patches promptly once available. These measures go beyond generic advice by focusing on controlling workspace sources, user education, and proactive monitoring tailored to the development environment context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6994257080d747be207b7298

Added to database: 2/17/2026, 8:23:12 AM

Last enriched: 2/17/2026, 8:25:18 AM

Last updated: 2/17/2026, 2:44:55 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats