Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper neutralization of special elements in output used by a downstream component ('injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to bypass a security feature over a network. | |
| Title | GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability | |
| First Time appeared |
Microsoft
Microsoft visual Studio Code |
|
| Weaknesses | CWE-74 | |
| CPEs | cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Microsoft
Microsoft visual Studio Code |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2026-05-15T17:12:52.876Z
Reserved: 2026-04-16T19:12:36.196Z
Link: CVE-2026-41109
Updated: 2026-05-13T10:00:19.178Z
Status : Analyzed
Published: 2026-05-12T18:17:22.210
Modified: 2026-05-15T15:27:35.300
Link: CVE-2026-41109
No data.
OpenCVE Enrichment
Updated: 2026-05-12T22:30:05Z