PT-2025-32853 · Unknown+1 · Github Copilot+1

Johann Rehberger

+3

·

Published

2025-08-12

·

Updated

2026-03-14

·

CVE-2025-53773

CVSS v3.1
7.8
VectorAV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
GitHub Copilot and Visual Studio GitHub Copilot versions prior to 17.14.12 and Visual Studio (affected versions not specified)
Description An improper neutralization of special elements in commands, known as a 'command injection', exists in GitHub Copilot and Visual Studio. This allows an unauthorized attacker to execute code locally. The issue arises from the way the software handles specific elements within commands, potentially enabling malicious code execution through prompt injection. The exploit can overwrite the Copilot configuration file, placing it into a state that allows immediate remote code execution, bypassing user approvals. This vulnerability is considered wormable, meaning it can self-replicate and spread.
Recommendations Update GitHub Copilot to version 17.14.12. Update Visual Studio to the latest available version.

Exploit

Fix

RCE

Command Injection

Weakness Enumeration

Related Identifiers

BDU:2025-10171
CVE-2025-53773

Affected Products

Github Copilot
Visual Studio