Description
Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio Code allows an authorized attacker to disclose information over a network.
Published: 2026-04-14
Score: 5.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure via Command Injection
Action: Update Extension
AI Analysis

Impact

An improper neutralization of special elements within a command allows an authorized attacker to execute arbitrary commands and subsequently reveal sensitive information over the network. The flaw enables command injection that can lead to disclosure of data accessible through the extension’s network traffic.

Affected Systems

Microsoft Visual Studio Code Copilot Chat Extension is affected. The extension operates within Visual Studio Code, and no specific version range is provided in the data. The attack requires the attacker to have authorized access to the extension, such as an authenticated user or someone who can install or modify it.

Risk and Exploitability

The CVSS score of 5.7 indicates moderate severity. No EPSS data is available, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires authenticated or local privileges, making the threat primarily a compromise of confidentiality rather than integrity or availability.

Generated by OpenCVE AI on April 14, 2026 at 19:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest update for the Copilot Chat Extension from Microsoft or download the patch from the provided advisory.
  • If an update is not yet available, disable the Copilot Chat Extension in Visual Studio Code until a fix is released.
  • Restrict extension installation to trusted users and enforce least‑privilege permissions for VS Code extensions.
  • Monitor VS Code activity logs for unexpected command executions or abnormal network traffic originating from the extension.
  • Verify that any data passed to commands is properly sanitized to prevent injection attacks and disable features that expose shell interfaces if they are not required.

Generated by OpenCVE AI on April 14, 2026 at 19:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio Code allows an authorized attacker to disclose information over a network.
Title GitHub Copilot and Visual Studio Code Information Disclosure Vulnerability
First Time appeared Microsoft
Microsoft visual Studio Code Copilot Chat Extension
Weaknesses CWE-77
CPEs cpe:2.3:a:microsoft:visual_studio_code_copilot_chat_extension:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft visual Studio Code Copilot Chat Extension
References
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Visual Studio Code Copilot Chat Extension
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-15T21:53:55.176Z

Reserved: 2026-01-14T16:59:33.462Z

Link: CVE-2026-23653

cve-icon Vulnrichment

Updated: 2026-04-14T19:35:41.445Z

cve-icon NVD

Status : Received

Published: 2026-04-14T18:16:44.137

Modified: 2026-04-14T18:16:44.137

Link: CVE-2026-23653

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T15:15:06Z

Weaknesses