Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Open VSX Flaw Allowed Extension Hijacks

June 27, 2025
Reading Time: 2 mins read
in Alerts
Open VSX Flaw Allowed Extension Hijacks

A critical vulnerability has been disclosed in the popular Open VSX Registry by some cybersecurity research analysts. If successfully exploited, this flaw could have enabled attackers to take control of the entire extensions marketplace. This would have posed a very severe supply chain risk to a large number of software development projects. Open VSX Registry is an open-source project and an alternative to the official Visual Studio Code Marketplace. Several popular code editors like Cursor, Gitpod, and others integrate it directly into their online services. A researcher said this vulnerability provides attackers full control over the entire extensions marketplace and developer machines.

The vulnerability discovered by Koi Security is rooted in the platform’s public publish-extensions software source code repository. In the backend, this plays out in the form of a GitHub Actions workflow that runs every single day. This automated workflow runs daily at 3:03 a.m. UTC and takes a list of extensions as its input. This workflow runs with privileged credentials, including a secret token that has the power to publish any extension. The root of this vulnerability is that an installation process runs the arbitrary build scripts of all extensions. It does this while also providing them with full access to the privileged secret token environment variable.

This specific security flaw means that it is possible for anyone to obtain access to the main service account’s secret token. This provides an attacker with the ability to publish new extensions and also to tamper with any existing ones. By exploiting this continuous integration issue, a malicious actor could publish malicious updates to every single extension. This widespread adoption means that a compromise of Open VSX is truly a supply-chain nightmare security scenario. Every time an extension is installed or updated, these actions go through the compromised Open VSX marketplace.

Following a responsible disclosure on May 4, 2025, multiple rounds of fixes were proposed by the maintainers. A final patch for the critical vulnerability was officially deployed by the project on the twenty-fifth of June. The risk posed by extensions has not gone unnoticed by MITRE, which introduced a new technique in its framework. The ATT&CK framework added the “IDE Extensions” technique back in April 2025, acknowledging this growing attack surface. Every marketplace item is a potential backdoor and deserves the same diligence as any other software dependency package. If left unchecked, they create a sprawling, invisible supply chain that attackers are now increasingly exploiting.

Reference:

  • Critical Open VSX Registry Vulnerability Put Millions Of Developers At Risk
Tags: APT28Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJune 2025RussiaSignalUkraine
ADVERTISEMENT

Related Posts

Fake Firms Push Malware on Crypto Users

Fake Sites Push Investment Scams

July 11, 2025
Fake Firms Push Malware on Crypto Users

Severe WordPress Flaw 200K Sites at Risk

July 11, 2025
Fake Firms Push Malware on Crypto Users

Fake Firms Push Malware on Crypto Users

July 11, 2025
Hackers Revive SEO Poisoning

Hackers Revive SEO Poisoning

July 10, 2025
Hackers Revive SEO Poisoning

RondoDox Botnet Exploits Router Flaws

July 10, 2025
Hackers Revive SEO Poisoning

ServiceNow Data Exposure via ACLs

July 10, 2025

Latest Alerts

Fake Sites Push Investment Scams

Fake Firms Push Malware on Crypto Users

Severe WordPress Flaw 200K Sites at Risk

RondoDox Botnet Exploits Router Flaws

ServiceNow Data Exposure via ACLs

Hackers Revive SEO Poisoning

Subscribe to our newsletter

    Latest Incidents

    Microsoft’s Outlook Long Outage

    Avantic Lab Affected By Ransomware

    $40M+ Stolen from GMX Crypto Platform

    Bitcoin Depot Breach Exposes Data

    McDonald’s AI Hiring Bot Exposes Data

    Nippon Steel Solutions Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial