Description
Time-of-check time-of-use (toctou) race condition in GitHub Copilot and Visual Studio allows an authorized attacker to execute code over a network.
Published: 2026-02-10
Score: 8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft visual Studio Code Copilot Chat Extension
CPEs cpe:2.3:a:microsoft:visual_studio_code_copilot_chat_extension:*:*:*:*:*:*:*:*
Vendors & Products Microsoft visual Studio Code Copilot Chat Extension

Thu, 26 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:-:*:*

Tue, 10 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description Time-of-check time-of-use (toctou) race condition in GitHub Copilot and Visual Studio allows an authorized attacker to execute code over a network.
Title GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft visual Studio Code
Weaknesses CWE-367
CPEs cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft visual Studio Code
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Visual Studio Code Visual Studio Code Copilot Chat Extension
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-05-11T21:25:52.975Z

Reserved: 2025-12-30T18:10:54.846Z

Link: CVE-2026-21523

cve-icon Vulnrichment

Updated: 2026-02-25T15:43:21.756Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T18:16:34.743

Modified: 2026-02-11T21:41:36.627

Link: CVE-2026-21523

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:45:10Z

Weaknesses