Description
Improper neutralization of special elements in output used by a downstream component ('injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to bypass a security feature over a network.
Published: 2026-05-12
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an injection flaw caused by improper neutralization of special elements in output that is later used by a downstream component. This flaw allows an attacker to supply crafted data that bypasses a security enforcement mechanism in both GitHub Copilot and Visual Studio Code. The weakness is a classic input–output contamination problem identified as CWE‑74 and can lead to an unauthorized attacker overriding controls that normally restrict or filter user actions.

Affected Systems

Microsoft Visual Studio Code is the only vendor/product listed, with no specific affected versions provided. The issue applies to instances running the default Copilot integration within the editor.

Risk and Exploitability

The CVSS score of 8.8 indicates high severity. No EPSS score is available, so exploitation likelihood cannot be quantified. The vulnerability is not listed in CISA KEV, but due to its high impact score and the fact it can be triggered over a network, it warrants immediate attention. The likely attack vector is a remote attacker providing malicious output that is injected into the editor’s security checks; no privileged access or local privilege escalation is required.

Generated by OpenCVE AI on May 12, 2026 at 20:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Microsoft Visual Studio Code update that includes the Copilot security fix
  • Update or reinstall the GitHub Copilot extension to a patched version
  • Configure network restrictions or firewall rules to limit exposure of the editor to untrusted sources

Generated by OpenCVE AI on May 12, 2026 at 20:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description Improper neutralization of special elements in output used by a downstream component ('injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to bypass a security feature over a network.
Title GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability
First Time appeared Microsoft
Microsoft visual Studio Code
Weaknesses CWE-74
CPEs cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft visual Studio Code
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Visual Studio Code
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-05-13T03:56:30.872Z

Reserved: 2026-04-16T19:12:36.196Z

Link: CVE-2026-41109

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T18:17:22.210

Modified: 2026-05-12T18:17:22.210

Link: CVE-2026-41109

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T22:30:05Z

Weaknesses