CVE-2025-47959
Visual Studio Remote Code Execution Vulnerability
Severity Score
7.1
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
Improper neutralization of special elements used in a command ('command injection') in Visual Studio allows an authorized attacker to execute code over a network.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Visual Studio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of the devcontainer.json file. When opening an project, the user interface fails to warn the user of unsafe actions. An attacker can leverage this vulnerability to execute code in the context of the current user.
*Credits:
Nitesh Surana (@_niteshsurana) & Nelson William Gamazo Sanchez of Trend Micro Research
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2025-05-14 CVE Reserved
- 2025-06-10 CVE Published
- 2025-07-11 CVE Updated
- 2025-08-20 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47959 | 2025-06-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Microsoft Visual Studio 2022 Version 17.12 Search vendor "Microsoft" for product "Microsoft Visual Studio 2022 Version 17.12" | >= 17.12.0 < 17.12.9 Search vendor "Microsoft" for product "Microsoft Visual Studio 2022 Version 17.12" and version " >= 17.12.0 < 17.12.9" | en |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Microsoft Visual Studio 2022 Version 17.8 Search vendor "Microsoft" for product "Microsoft Visual Studio 2022 Version 17.8" | >= 17.8.0 < 17.8.22 Search vendor "Microsoft" for product "Microsoft Visual Studio 2022 Version 17.8" and version " >= 17.8.0 < 17.8.22" | en |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Microsoft Visual Studio 2022 Version 17.10 Search vendor "Microsoft" for product "Microsoft Visual Studio 2022 Version 17.10" | >= 17.10.0 < 17.10.16 Search vendor "Microsoft" for product "Microsoft Visual Studio 2022 Version 17.10" and version " >= 17.10.0 < 17.10.16" | en |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Microsoft Visual Studio 2022 Version 17.14 Search vendor "Microsoft" for product "Microsoft Visual Studio 2022 Version 17.14" | >= 17.14.0 < 17.14.5 Search vendor "Microsoft" for product "Microsoft Visual Studio 2022 Version 17.14" and version " >= 17.14.0 < 17.14.5" | en |
Affected
|