CVE-2025-47959: Visual Studio Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 7.1)
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Unlikely
Patch Tuesday
2025-Jun
Released
2025-06-10
EPSS Score
0.61% (percentile: 69.7%)

Description

Improper neutralization of special elements used in a command ('command injection') in Visual Studio allows an authorized attacker to execute code over a network.

FAQ

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires that the target system be set up in a specific manner and the attacker to have knowledge of that setup. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with standard user privileges could place a malicious file in an online directory or in a local network location and then wait for the user to run the file. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a specially crafted file to be placed either in an online directory or in a local network location. When a victim runs this file, it loads the malicious DLL.

Affected Products (4)

Developer Tools

  • Microsoft Visual Studio 2022 version 17.12
  • Microsoft Visual Studio 2022 version 17.8
  • Microsoft Visual Studio 2022 version 17.10
  • Microsoft Visual Studio 2022 version 17.14

Security Updates (4)

Acknowledgments

Nitesh Surana (@_niteshsurana) & Nelson William Gamazo Sanchez of Trend Micro Research with Trend Zero Day Initiative

Revision History

  • 2025-06-10: Information published.