CVE-2026-21256: GitHub Copilot and Visual Studio Remote Code Execution Vulnerability
Overview
- Severity
- High (CVSS 8.8)
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
- Category
- Remote Code Execution
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2026-Feb
- Released
- 2026-02-10
- Last Updated
- 2026-03-13
- EPSS Score
- 0.04% (percentile: 12.1%)
Description
Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute code over a network.
FAQ
How could an attacker exploit this vulnerability?
The AV:N rating indicates the vulnerability is exploitable over the network, meaning an attacker can deliver a malicious prompt remotely without prior access, while UI:R means a user must interact with Copilot for exploitation to occur. Due to prompt injection, the system is coerced into executing attacker-controlled instructions, which can escalate into remote code execution (RCE) when the compromised prompt causes backend components or integrated tools to run unintended commands.
Affected Products (2)
Developer Tools
- Microsoft Visual Studio 2022 version 17.14
- Microsoft Visual Studio 2026 version 18.3
Security Updates (2)
Acknowledgments
<a href="https://www.linkedin.com/in/tarek-nakkouch/">Nakkouch Tarek</a>
Revision History
- 2026-02-10: Information published.
- 2026-02-11: Changes made to the security updates links and information. This is an informational change only.
- 2026-03-13: Changes made to the security updates links and information. This is an informational change only.