Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25931: CWE-276: Incorrect Default Permissions in streetsidesoftware vscode-spell-checker

0
High
VulnerabilityCVE-2026-25931cvecve-2026-25931cwe-276cwe-807cwe-829
Published: Mon Feb 09 2026 (02/09/2026, 22:10:37 UTC)
Source: CVE Database V5
Vendor/Project: streetsidesoftware
Product: vscode-spell-checker

Description

CVE-2026-25931 is a high-severity vulnerability in the vscode-spell-checker extension for Visual Studio Code versions prior to 4. 5. 4. It arises from incorrect default permissions where the extension trusts the cSpell. trustedWorkspace configuration flag by default, allowing untrusted workspaces to execute malicious JavaScript/TypeScript configuration files. This leads to arbitrary code execution with the user's privileges when opening a malicious workspace. The vulnerability does not require prior authentication but does require user interaction to open the workspace. It impacts confidentiality, integrity, and availability by enabling attacker-controlled code execution. The issue is fixed in version 4. 5.

AI-Powered Analysis

AILast updated: 02/17/2026, 09:38:51 UTC

Technical Analysis

The vulnerability identified as CVE-2026-25931 affects the vscode-spell-checker extension for Visual Studio Code, specifically versions before 4.5.4. The root cause is an incorrect default permission setting where the configuration value cSpell.trustedWorkspace defaults to true in package.json and is treated as authoritative without consulting VS Code's workspace-trust state. This means that any workspace configuration that sets this flag to a truthy value causes the extension to consider the workspace trusted. Consequently, the extension loads and executes JavaScript or TypeScript configuration files such as .cspell.config.js, .cspell.config.mjs, or .cspell.config.ts from the workspace. An attacker can exploit this by placing a malicious configuration file in an untrusted workspace. When a user opens this workspace, the extension host executes the attacker's Node.js code with the same privileges as the user, leading to arbitrary code execution. The vulnerability requires user interaction (opening the workspace) but no prior authentication or elevated privileges. The CVSS v3.1 score is 7.8 (high), reflecting the local attack vector, low attack complexity, no privileges required, required user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. The flaw is addressed in version 4.5.4 of the extension by correcting the trust evaluation logic to properly respect VS Code's workspace trust state, preventing untrusted workspaces from executing arbitrary code.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to developers and teams using Visual Studio Code with the vulnerable vscode-spell-checker extension. Exploitation could lead to arbitrary code execution on developer machines, potentially allowing attackers to steal sensitive source code, credentials, or inject malicious code into projects. This can compromise the integrity of software supply chains and lead to broader organizational breaches if compromised developer environments are connected to internal networks or CI/CD pipelines. The impact extends to confidentiality, integrity, and availability of development environments and potentially downstream production systems. Organizations with remote or hybrid workforces, where developers may open untrusted or external workspaces, are particularly vulnerable. The lack of known exploits in the wild reduces immediate risk but does not eliminate it, especially as attackers may develop exploits rapidly after disclosure. The vulnerability also undermines trust in workspace isolation mechanisms, increasing the risk of supply chain attacks and insider threats.

Mitigation Recommendations

European organizations should immediately update the vscode-spell-checker extension to version 4.5.4 or later to ensure the vulnerability is patched. Additionally, enforce strict workspace trust policies in Visual Studio Code to prevent automatic execution of code from untrusted workspaces. Educate developers about the risks of opening workspaces from unverified sources and implement endpoint security controls to monitor and restrict execution of unauthorized scripts. Employ application whitelisting and behavior-based detection to identify suspicious extension host activities. Integrate code signing and verification for workspace configuration files where possible. Regularly audit installed extensions and their versions across developer environments. Consider isolating development environments using containerization or virtual machines to limit the impact of potential code execution. Finally, monitor security advisories for any emerging exploits targeting this vulnerability and respond promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T16:22:17.786Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698a60344b57a58fa175cdfc

Added to database: 2/9/2026, 10:31:16 PM

Last enriched: 2/17/2026, 9:38:51 AM

Last updated: 2/21/2026, 12:18:04 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats