PT-2025-32853 · Unknown+1 · Github Copilot+1
Johann Rehberger
+3
·
Published
2025-08-12
·
Updated
2026-03-14
·
CVE-2025-53773
CVSS v3.1
7.8
| Vector | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
GitHub Copilot and Visual Studio
GitHub Copilot versions prior to 17.14.12 and Visual Studio (affected versions not specified)
Description
An improper neutralization of special elements in commands, known as a 'command injection', exists in GitHub Copilot and Visual Studio. This allows an unauthorized attacker to execute code locally. The issue arises from the way the software handles specific elements within commands, potentially enabling malicious code execution through prompt injection. The exploit can overwrite the Copilot configuration file, placing it into a state that allows immediate remote code execution, bypassing user approvals. This vulnerability is considered wormable, meaning it can self-replicate and spread.
Recommendations
Update GitHub Copilot to version 17.14.12.
Update Visual Studio to the latest available version.
Exploit
Fix
RCE
Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Github Copilot
Visual Studio