Back

Critical Vulnerability in Open VSX Allows Malicious Extensions to Bypass Security

Severity: High (Score: 67.5)

Sources: Cybersecuritynews, Gbhackers

Summary

Open VSX, the extension marketplace for VS Code forks like Cursor and Windsurf, has addressed a critical vulnerability known as 'Open Sesame' in its pre-publish scanning pipeline. This flaw allowed malicious extensions to bypass security checks and be published undetected. The vulnerability resulted from a fail-open condition in the scanning workflow, posing a significant risk to users of these platforms. The issue affects all extensions published through Open VSX, potentially compromising the security of numerous code editors relying on this marketplace. The vulnerability was fixed shortly before the articles were published, but the scope of impact remains concerning as malicious actors could exploit it. Users are urged to remain vigilant and ensure their extensions are from trusted sources. The exact number of affected extensions is not specified, but the risk is substantial given the popularity of the marketplace. Current status indicates that the vulnerability has been patched, but awareness and caution are still necessary. Key Points: • Open VSX fixed a critical vulnerability allowing malicious extensions to bypass security. • The flaw, named 'Open Sesame,' was due to a fail-open condition in the scanning process. • All users of Open VSX-based code editors are potentially at risk from this vulnerability.

Key Entities

  • Open VSX (company)
  • VS Code Fork Ecosystem (platform)
  • New Scanner Vulnerability (vulnerability)
  • Open Sesame (vulnerability)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed