Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28353: CWE-506: Embedded Malicious Code in aquasecurity trivy-vscode-extension

0
Critical
VulnerabilityCVE-2026-28353cvecve-2026-28353cwe-506
Published: Thu Mar 05 2026 (03/05/2026, 20:02:59 UTC)
Source: CVE Database V5
Vendor/Project: aquasecurity
Product: trivy-vscode-extension

Description

Trivy Vulnerability Scanner is a VS Code extension that helps find vulnerabilities. In Trivy VSCode Extension version 1.8.12, which was distributed via OpenVSX marketplace was compromised and contained malicious code designed to leverage local AI coding agent to collect and exfiltrate sensitive information. Users using the affected artifact are advised to immediately remove it and rotate environment secrets. The malicious artifact has been removed from the marketplace. No other affected artifacts have been identified.

AI-Powered Analysis

AILast updated: 03/05/2026, 20:23:53 UTC

Technical Analysis

CVE-2026-28353 concerns a supply chain compromise of the Trivy Vulnerability Scanner VS Code extension (version 1.8.12) distributed through the OpenVSX marketplace. Trivy is a popular open-source tool by Aqua Security used to detect vulnerabilities in container images and codebases. The compromised extension contained embedded malicious code that exploited a local AI coding agent integrated with the extension environment. This malicious code was designed to stealthily collect sensitive information such as environment secrets, credentials, or proprietary code snippets and exfiltrate them to an attacker-controlled endpoint. The attack requires no user interaction, privileges, or authentication, and operates remotely over the network, making it highly accessible to attackers. The malicious artifact was identified and removed from the marketplace shortly after discovery. The vulnerability is classified under CWE-506 (Embedded Malicious Code) and has a CVSS 4.0 base score of 10.0, reflecting its critical severity and broad impact on confidentiality, integrity, and availability. No other versions or related artifacts have been found to be affected, and no active exploitation has been reported to date. The incident highlights the risks of supply chain attacks in software development tools, especially those integrating AI capabilities that can be abused to access sensitive data.

Potential Impact

The impact of CVE-2026-28353 is severe for organizations globally, particularly those relying on the Trivy VS Code extension for vulnerability scanning in their development workflows. The embedded malicious code can lead to the unauthorized disclosure of sensitive environment secrets, credentials, proprietary source code, and other confidential information. This data leakage can facilitate further attacks such as privilege escalation, lateral movement, intellectual property theft, and compromise of production environments. Since the extension operates within developers' local environments, the breach can bypass traditional network defenses and endpoint protections. The lack of required privileges or user interaction lowers the barrier for exploitation, increasing the risk of widespread compromise. Organizations with automated CI/CD pipelines or cloud-native development practices that integrate Trivy are especially vulnerable. The reputational damage, regulatory consequences, and operational disruptions resulting from such a breach can be substantial. Although no known exploits are currently active, the critical severity and ease of exploitation necessitate immediate remediation to prevent potential attacks.

Mitigation Recommendations

To mitigate the risks posed by CVE-2026-28353, organizations should take the following specific actions: 1) Immediately identify and uninstall version 1.8.12 of the Trivy VS Code extension from all developer workstations and build environments. 2) Rotate all environment secrets, API keys, credentials, and tokens that may have been exposed during the period the compromised extension was installed. 3) Audit recent access logs and network traffic for signs of data exfiltration or suspicious activity related to the extension's usage timeframe. 4) Restrict or monitor network egress from developer machines to detect anomalous connections potentially used for exfiltration. 5) Educate developers on verifying the integrity and provenance of extensions and tools, emphasizing the risks of supply chain compromises. 6) Consider implementing application allowlisting or endpoint detection solutions that can detect or block unauthorized code execution within development environments. 7) Monitor official Aqua Security channels and OpenVSX marketplace for updates or patches and apply any new versions after verification. 8) Review and enhance supply chain security policies to include vetting of third-party extensions and dependencies. These measures go beyond generic advice by focusing on the specific nature of this embedded malicious code and its exploitation vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-26T18:38:13.890Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a9e2f561e8e69ef5e92416

Added to database: 3/5/2026, 8:09:25 PM

Last enriched: 3/5/2026, 8:23:53 PM

Last updated: 3/5/2026, 11:57:58 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses