Description
Improper neutralization of input during web page generation ('cross-site scripting') in Visual Studio Code allows an unauthorized attacker to bypass a security feature locally.
Published: 2026-05-12
Score: 6.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability originates from improper neutralization of input during web page generation in Visual Studio Code. User-controlled data that is not correctly escaped can be injected as script, causing cross‑site scripting that runs within the editor’s context. This allows a malicious actor to execute arbitrary code and interact with local resources, thereby bypassing built‑in security guardrails, accessing confidential information, and modifying the application state. The weakness matches CWE‑79, CWE‑200, and CWE‑59.

Affected Systems

Microsoft Visual Studio Code. All versions released prior to the vendor’s fix are potentially affected, as the issue is tied to a global input handling flaw in the product. Users should verify whether their local installations match the pre‑patch state and plan to upgrade accordingly.

Risk and Exploitability

The CVSS assessment rates the flaw as moderate with a score of 6.3. EPSS information is unavailable, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires local access to the editor, typically through a malicious extension, script, or user‑provided content that is rendered into a web page. Given the local nature of the threat, the risk is limited to environments where an attacker can influence the input processed by Visual Studio Code, but the impact remains significant due to the ability to execute arbitrary scripts and access sensitive data.

Generated by OpenCVE AI on May 12, 2026 at 20:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest version of Visual Studio Code from Microsoft’s official distribution channels to receive the vendor‑supplied fix.
  • If an update cannot be applied immediately, temporarily disable or uninstall extensions that generate or inject web‑content to reduce the exposure to script injection.
  • Launch Visual Studio Code with extensions disabled ("--disable-extensions" flag) or consider restricting webview content while awaiting the official patch.

Generated by OpenCVE AI on May 12, 2026 at 20:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description Improper neutralization of input during web page generation ('cross-site scripting') in Visual Studio Code allows an unauthorized attacker to bypass a security feature locally.
Title Visual Studio Code Security Feature Bypass Vulnerability
First Time appeared Microsoft
Microsoft visual Studio Code
Weaknesses CWE-200
CWE-59
CWE-79
CPEs cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft visual Studio Code
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Visual Studio Code
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-05-12T17:53:54.548Z

Reserved: 2026-04-21T22:14:12.923Z

Link: CVE-2026-41610

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T18:17:22.847

Modified: 2026-05-12T18:17:22.847

Link: CVE-2026-41610

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T21:30:24Z

Weaknesses