Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 13 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft visual Studio 2026
|
|
| CPEs | cpe:2.3:a:microsoft:visual_studio_2026:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Microsoft visual Studio 2026
|
Thu, 26 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:-:*:* |
Tue, 10 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an authorized attacker to elevate privileges over a network. | |
| Title | GitHub Copilot and Visual Studio Elevation of Privilege Vulnerability | |
| First Time appeared |
Microsoft
Microsoft visual Studio 2022 |
|
| Weaknesses | CWE-77 | |
| CPEs | cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Microsoft
Microsoft visual Studio 2022 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2026-05-11T21:25:38.855Z
Reserved: 2025-12-11T21:02:05.737Z
Link: CVE-2026-21257
Updated: 2026-02-25T15:43:02.734Z
Status : Analyzed
Published: 2026-02-10T18:16:27.483
Modified: 2026-02-11T19:47:12.797
Link: CVE-2026-21257
No data.
OpenCVE Enrichment
Updated: 2026-04-15T17:45:10Z