Description
Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio Code allows an unauthorized attacker to bypass a security feature over a network.
Published: 2026-02-10
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Command Injection (Security Feature Bypass)
Action: Apply Patch
AI Analysis

Impact

An improper neutralization of special elements used in a command allows an attacker to execute arbitrary commands through GitHub Copilot and Visual Studio Code. This command injection flaw can be used to bypass a built‑in security feature over a network, enabling the attacker to gain unauthorized control or execute malicious code. The weakness is classified as CWE‑77.

Affected Systems

The vulnerability affects Microsoft Visual Studio Code and the Copilot Chat Extension for Visual Studio Code. All installations of either component are potentially susceptible, regardless of the operating system, provided they are running a version before the patch that fixes the command injection flaw.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity, and the EPSS score of less than 1% suggests a low probability of widespread exploitation at present. The vulnerability is not listed in CISA's KEV catalog. Attackers would likely send crafted payloads over the network to the affected Visual Studio Code instance; the exact attack vector must be inferred from the description, as it is not explicitly detailed in the advisory.

Generated by OpenCVE AI on April 15, 2026 at 16:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest security update for Visual Studio Code and the Copilot Chat Extension
  • If the update cannot be applied immediately, temporarily disable or uninstall the Copilot Chat Extension until a patched version is available
  • Monitor application logs for unexpected command execution attempts and consider blocking suspicious traffic at the network perimeter

Generated by OpenCVE AI on April 15, 2026 at 16:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft visual Studio Code Copilot Chat Extension
CPEs cpe:2.3:a:microsoft:visual_studio_code_copilot_chat_extension:*:*:*:*:*:*:*:*
Vendors & Products Microsoft visual Studio Code Copilot Chat Extension

Thu, 26 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 17:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Wed, 11 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:-:*:*

Tue, 10 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio Code allows an unauthorized attacker to bypass a security feature over a network.
Title GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability
First Time appeared Microsoft
Microsoft visual Studio Code
Weaknesses CWE-77
CPEs cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft visual Studio Code
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Visual Studio Code Visual Studio Code Copilot Chat Extension
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-10T13:21:37.684Z

Reserved: 2025-12-30T18:10:54.845Z

Link: CVE-2026-21518

cve-icon Vulnrichment

Updated: 2026-02-25T15:43:48.047Z

cve-icon NVD

Status : Modified

Published: 2026-02-10T18:16:34.263

Modified: 2026-02-23T17:23:27.390

Link: CVE-2026-21518

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:45:10Z

Weaknesses