Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1137 (Office Application Startup)
Malicious extensions load persistence within the IDE context.
T1204.002 (User Execution: Malicious File) Triggered when developers open untrusted HTML/Markdown or repositories.
T1059 (Command and Scripting Interpreter) Extensions execute arbitrary commands via local servers or preview renderers.
T1020 (Automated Exfiltration)
Localhost servers used to funnel data to remote attackers
CVE Profile & Telemetry
Live Server (ritwickdey.LiveServer)
Assigned CVE-2025-65717 with a critical CVSS score of 9.1. This vulnerability allows for remote file exfiltration and is currently Active/Unpatched.
Markdown Preview Enhanced (shd101wyy.markdown-preview-enhanced) Assigned CVE-2025-65716 with a high CVSS score of 8.8. This flaw facilitates JavaScript execution and port scanning; it remains Active/Unpatched.
Code Runner (formulahendry.code-runner) Assigned CVE-2025-65715 with a high CVSS score of 7.8. This vulnerability enables Remote Code Execution (RCE) and is currently Active/Unpatched.
Microsoft Live Preview (ms-vscode.live-server) No specific CVE ID assigned. The vulnerability was effectively Fixed in version v0.4.16+.
Attack Vector Analysis
The vulnerability stems from IDE extensions inheriting the user's privileges without sufficient sandboxing.
Localhost Exploitation
Extensions like Live Server spawn local web servers. Attackers can craft payloads (e.g., malicious HTML) that interact with these servers to read files outside the project directory.
Cross-IDE Impact
These vulnerabilities are confirmed to affect VS Code-compatible forks like Cursor and Windsurf.
Remediation - THE ENTERPRISE TRACK
Actions ordered by NIST CSF Function.
GOVERN (GV)
Command
Audit organization-wide IDE usage. Establish an "Approved Extension" policy that explicitly bans extensions with unpatched Critical CVEs.
Command
Issue an advisory to engineering teams: "Do not open untrusted repositories or paste settings into settings.json while vulnerable extensions are active.".
DETECT (DE)
Command
Run the following CLI check on developer endpoints to identify vulnerable instances:
code --list-extensions --show-versions.
Command
Monitor ED/SIEM for unexpected outbound traffic from code.exe or node.exe processes initiated by VS Code, particularly to non-corporate IPs.
RESPOND (RS)
Command
IMMEDIATE REMOVAL of ritwickdey.LiveServer, formulahendry.code-runner, and shd101wyy.markdown-preview-enhanced until vendor patches are confirmed.
Command
For Microsoft Live Preview, force update to v0.4.16+ immediately.
RECOVER (RC)
Command
If exploitation is suspected (e.g., unexplained network traffic during dev sessions), assume local secrets are compromised. Rotate all API keys, SSH keys, and environment variables stored on the affected machine.
Remediation - THE HOME USER TRACK
Priority 1: Hardening
Command
Open VS Code. Go to the Extensions view (Ctrl+Shift+X).
Command
Search for "Live Server", "Code Runner", and "Markdown Preview Enhanced". If installed, click Uninstall or Disable immediately.
Command
If you use "Live Preview" by Microsoft, ensure it has auto-updated to version 0.4.16 or higher.
Priority 2: Hygiene
Command
Check your global settings.json file. Ensure no strange snippets were pasted from online tutorials, as these can trigger RCE flows.
Command
Avoid running "localhost" servers on public Wi-Fi without firewall protection.
Hardening & References
Source
OX Security Research Blog
Constraint
Developers must minimize "local admin" usage and utilize secret managers rather than plaintext .env files to mitigate the impact of file exfiltration.