Impact
An improper neutralization of special elements used in a command allows an attacker to execute arbitrary commands through GitHub Copilot and Visual Studio Code. This command injection flaw can be used to bypass a built‑in security feature over a network, enabling the attacker to gain unauthorized control or execute malicious code. The weakness is classified as CWE‑77.
Affected Systems
The vulnerability affects Microsoft Visual Studio Code and the Copilot Chat Extension for Visual Studio Code. All installations of either component are potentially susceptible, regardless of the operating system, provided they are running a version before the patch that fixes the command injection flaw.
Risk and Exploitability
The CVSS score of 8.8 indicates a high severity, and the EPSS score of less than 1% suggests a low probability of widespread exploitation at present. The vulnerability is not listed in CISA's KEV catalog. Attackers would likely send crafted payloads over the network to the affected Visual Studio Code instance; the exact attack vector must be inferred from the description, as it is not explicitly detailed in the advisory.
OpenCVE Enrichment