CVE-2026-25931: CWE-276: Incorrect Default Permissions in streetsidesoftware vscode-spell-checker
CVE-2026-25931 is a high-severity vulnerability in the vscode-spell-checker extension for Visual Studio Code versions prior to 4. 5. 4. It arises from incorrect default permissions where the extension trusts the cSpell. trustedWorkspace configuration flag by default, allowing untrusted workspaces to execute malicious JavaScript/TypeScript configuration files. This leads to arbitrary code execution with the user's privileges when opening a malicious workspace. The vulnerability does not require prior authentication but does require user interaction to open the workspace. It impacts confidentiality, integrity, and availability by enabling attacker-controlled code execution. The issue is fixed in version 4. 5.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-25931 affects the vscode-spell-checker extension for Visual Studio Code, specifically versions before 4.5.4. The root cause is an incorrect default permission setting where the configuration value cSpell.trustedWorkspace defaults to true in package.json and is treated as authoritative without consulting VS Code's workspace-trust state. This means that any workspace configuration that sets this flag to a truthy value causes the extension to consider the workspace trusted. Consequently, the extension loads and executes JavaScript or TypeScript configuration files such as .cspell.config.js, .cspell.config.mjs, or .cspell.config.ts from the workspace. An attacker can exploit this by placing a malicious configuration file in an untrusted workspace. When a user opens this workspace, the extension host executes the attacker's Node.js code with the same privileges as the user, leading to arbitrary code execution. The vulnerability requires user interaction (opening the workspace) but no prior authentication or elevated privileges. The CVSS v3.1 score is 7.8 (high), reflecting the local attack vector, low attack complexity, no privileges required, required user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. The flaw is addressed in version 4.5.4 of the extension by correcting the trust evaluation logic to properly respect VS Code's workspace trust state, preventing untrusted workspaces from executing arbitrary code.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to developers and teams using Visual Studio Code with the vulnerable vscode-spell-checker extension. Exploitation could lead to arbitrary code execution on developer machines, potentially allowing attackers to steal sensitive source code, credentials, or inject malicious code into projects. This can compromise the integrity of software supply chains and lead to broader organizational breaches if compromised developer environments are connected to internal networks or CI/CD pipelines. The impact extends to confidentiality, integrity, and availability of development environments and potentially downstream production systems. Organizations with remote or hybrid workforces, where developers may open untrusted or external workspaces, are particularly vulnerable. The lack of known exploits in the wild reduces immediate risk but does not eliminate it, especially as attackers may develop exploits rapidly after disclosure. The vulnerability also undermines trust in workspace isolation mechanisms, increasing the risk of supply chain attacks and insider threats.
Mitigation Recommendations
European organizations should immediately update the vscode-spell-checker extension to version 4.5.4 or later to ensure the vulnerability is patched. Additionally, enforce strict workspace trust policies in Visual Studio Code to prevent automatic execution of code from untrusted workspaces. Educate developers about the risks of opening workspaces from unverified sources and implement endpoint security controls to monitor and restrict execution of unauthorized scripts. Employ application whitelisting and behavior-based detection to identify suspicious extension host activities. Integrate code signing and verification for workspace configuration files where possible. Regularly audit installed extensions and their versions across developer environments. Consider isolating development environments using containerization or virtual machines to limit the impact of potential code execution. Finally, monitor security advisories for any emerging exploits targeting this vulnerability and respond promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2026-25931: CWE-276: Incorrect Default Permissions in streetsidesoftware vscode-spell-checker
Description
CVE-2026-25931 is a high-severity vulnerability in the vscode-spell-checker extension for Visual Studio Code versions prior to 4. 5. 4. It arises from incorrect default permissions where the extension trusts the cSpell. trustedWorkspace configuration flag by default, allowing untrusted workspaces to execute malicious JavaScript/TypeScript configuration files. This leads to arbitrary code execution with the user's privileges when opening a malicious workspace. The vulnerability does not require prior authentication but does require user interaction to open the workspace. It impacts confidentiality, integrity, and availability by enabling attacker-controlled code execution. The issue is fixed in version 4. 5.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2026-25931 affects the vscode-spell-checker extension for Visual Studio Code, specifically versions before 4.5.4. The root cause is an incorrect default permission setting where the configuration value cSpell.trustedWorkspace defaults to true in package.json and is treated as authoritative without consulting VS Code's workspace-trust state. This means that any workspace configuration that sets this flag to a truthy value causes the extension to consider the workspace trusted. Consequently, the extension loads and executes JavaScript or TypeScript configuration files such as .cspell.config.js, .cspell.config.mjs, or .cspell.config.ts from the workspace. An attacker can exploit this by placing a malicious configuration file in an untrusted workspace. When a user opens this workspace, the extension host executes the attacker's Node.js code with the same privileges as the user, leading to arbitrary code execution. The vulnerability requires user interaction (opening the workspace) but no prior authentication or elevated privileges. The CVSS v3.1 score is 7.8 (high), reflecting the local attack vector, low attack complexity, no privileges required, required user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. The flaw is addressed in version 4.5.4 of the extension by correcting the trust evaluation logic to properly respect VS Code's workspace trust state, preventing untrusted workspaces from executing arbitrary code.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to developers and teams using Visual Studio Code with the vulnerable vscode-spell-checker extension. Exploitation could lead to arbitrary code execution on developer machines, potentially allowing attackers to steal sensitive source code, credentials, or inject malicious code into projects. This can compromise the integrity of software supply chains and lead to broader organizational breaches if compromised developer environments are connected to internal networks or CI/CD pipelines. The impact extends to confidentiality, integrity, and availability of development environments and potentially downstream production systems. Organizations with remote or hybrid workforces, where developers may open untrusted or external workspaces, are particularly vulnerable. The lack of known exploits in the wild reduces immediate risk but does not eliminate it, especially as attackers may develop exploits rapidly after disclosure. The vulnerability also undermines trust in workspace isolation mechanisms, increasing the risk of supply chain attacks and insider threats.
Mitigation Recommendations
European organizations should immediately update the vscode-spell-checker extension to version 4.5.4 or later to ensure the vulnerability is patched. Additionally, enforce strict workspace trust policies in Visual Studio Code to prevent automatic execution of code from untrusted workspaces. Educate developers about the risks of opening workspaces from unverified sources and implement endpoint security controls to monitor and restrict execution of unauthorized scripts. Employ application whitelisting and behavior-based detection to identify suspicious extension host activities. Integrate code signing and verification for workspace configuration files where possible. Regularly audit installed extensions and their versions across developer environments. Consider isolating development environments using containerization or virtual machines to limit the impact of potential code execution. Finally, monitor security advisories for any emerging exploits targeting this vulnerability and respond promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-09T16:22:17.786Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698a60344b57a58fa175cdfc
Added to database: 2/9/2026, 10:31:16 PM
Last enriched: 2/17/2026, 9:38:51 AM
Last updated: 2/21/2026, 12:18:04 AM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.