CVE-2025-64660: GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability
Overview
- Severity
- High (CVSS 8)
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
- Category
- Remote Code Execution
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2025-Nov
- Released
- 2025-11-20
- Last Updated
- 2025-11-25
- EPSS Score
- 0.13% (percentile: 33.1%)
Description
Improper access control in GitHub Copilot and Visual Studio Code allows an authorized attacker to execute code over a network.
FAQ
According to the CVSS metric, privileges are required (PR:L) and user interaction is required (UI:R). How could an attacker exploit this remote code execution vulnerability?
An authenticated attacker could place a malicious file in the targeted repo. The user would then have to trust the file on Visual Studio Code and ask for assistance from GitHub Copilot.
Affected Products (1)
Developer Tools
Security Updates (1)
Acknowledgments
<a href="https://x.com/ari_maccarita">Ari Marzuk</a> with https://maccarita.com/, <a href="https://www.linkedin.com/in/tarek-nakkouch/">Tarek Nakkouch</a>, <a href="https://linkedin.com/in/ameen-basha-37a8b710a">AmeenBasha M K</a>
Revision History
- 2025-11-20: Information published.
- 2025-11-25: The following revisions have been made: 1) In the Security Updates table, corrected the impact entries to Remote Code Execution. 2) The CVSS scores have been updated. These are informational changes only. Customers who have successfully installed the update do not need to take any further action.