No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 06 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aquasecurity
Aquasecurity trivy-vscode-extension |
|
| Vendors & Products |
Aquasecurity
Aquasecurity trivy-vscode-extension |
Thu, 05 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Trivy Vulnerability Scanner is a VS Code extension that helps find vulnerabilities. In Trivy VSCode Extension version 1.8.12, which was distributed via OpenVSX marketplace was compromised and contained malicious code designed to leverage local AI coding agent to collect and exfiltrate sensitive information. Users using the affected artifact are advised to immediately remove it and rotate environment secrets. The malicious artifact has been removed from the marketplace. No other affected artifacts have been identified. | |
| Title | Trivy Vulnerability Scanner: Unauthorized AI Agent Execution Code Included in OpenVSX Extension Release | |
| Weaknesses | CWE-506 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-06T17:04:35.360Z
Reserved: 2026-02-26T18:38:13.890Z
Link: CVE-2026-28353
Updated: 2026-03-06T17:04:30.236Z
Status : Received
Published: 2026-03-05T20:16:16.493
Modified: 2026-03-05T20:16:16.493
Link: CVE-2026-28353
No data.
OpenCVE Enrichment
Updated: 2026-03-06T15:01:08Z