Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65717: n/a

0
Medium
VulnerabilityCVE-2025-65717cvecve-2025-65717
Published: Mon Feb 16 2026 (02/16/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/25/2026, 00:11:02 UTC

Technical Analysis

CVE-2025-65717 is a vulnerability identified in the Live Server extension version 5.7.9 for Visual Studio Code, a widely used code editor. The flaw allows attackers to exfiltrate files by leveraging user interaction with a maliciously crafted HTML page served through the extension. The vulnerability stems from a combination of weaknesses: improper URL redirection (CWE-601), information exposure (CWE-200), and cross-site scripting (CWE-79). Specifically, the Live Server extension fails to properly validate or sanitize URLs and HTML content, enabling an attacker to craft a page that, when opened by a user, can access and transmit local files to an external server. The attack vector requires no privileges and no prior authentication but does require the user to interact with the malicious page, such as clicking a link or opening the page in the Live Server environment. The CVSS 3.1 base score is 4.3, indicating a medium severity primarily due to the confidentiality impact and the need for user interaction. There are no known exploits in the wild, and no official patches have been published at the time of this report. The vulnerability affects developers and organizations that use Visual Studio Code with the Live Server extension, particularly those who open untrusted or external HTML content. The issue highlights risks in development environments where extensions can expose local resources if not properly sandboxed or validated.

Potential Impact

The primary impact of CVE-2025-65717 is the unauthorized disclosure of local files from a developer's environment. This can lead to leakage of sensitive source code, configuration files, credentials, or other proprietary information. While the vulnerability does not affect system integrity or availability, the confidentiality breach can facilitate further attacks such as intellectual property theft, credential compromise, or targeted exploitation based on exposed data. Organizations worldwide that rely on Visual Studio Code and the Live Server extension for web development are at risk, especially if developers open untrusted HTML content or access external resources through the extension. The attack requires user interaction, limiting automated exploitation but still posing a significant risk in social engineering scenarios. The lack of patches increases exposure time, and the widespread use of Visual Studio Code amplifies potential impact. Development teams working on sensitive projects or in regulated industries face higher risks due to potential data leakage.

Mitigation Recommendations

1. Immediately restrict or disable the Live Server extension version 5.7.9 in Visual Studio Code until a patch is released. 2. Avoid opening untrusted or externally sourced HTML content using the Live Server extension to prevent triggering the vulnerability. 3. Educate developers about the risks of interacting with unknown or suspicious HTML pages served via Live Server. 4. Monitor official Visual Studio Code and Live Server extension channels for security updates and apply patches promptly once available. 5. Implement network-level controls to restrict outbound connections from developer machines to untrusted domains, limiting data exfiltration opportunities. 6. Use endpoint detection and response (EDR) tools to detect unusual file access or network activity related to Live Server usage. 7. Consider sandboxing or isolating development environments to contain potential data leaks. 8. Review and audit extension permissions and configurations regularly to minimize exposure. 9. Encourage use of alternative methods for local web serving that have stronger security controls if immediate patching is not feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6994257180d747be207b7406

Added to database: 2/17/2026, 8:23:13 AM

Last enriched: 2/25/2026, 12:11:02 AM

Last updated: 4/3/2026, 4:49:36 PM

Views: 265

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses