CVE-2026-23653
Command Injection in GitHub Copilot and VS Code Leads to Data Disclosure
Publication date: 2026-04-14
Last updated on: 2026-05-06
Assigner: Microsoft Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | github_copilot_chat | to 0.37.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows an authorized attacker to disclose information over a network due to improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio Code.
This information disclosure could potentially impact compliance with standards and regulations such as GDPR and HIPAA, which require protection of sensitive data and prevention of unauthorized data disclosure.
However, the provided information does not specify exact effects or compliance implications related to these standards.
Can you explain this vulnerability to me?
This vulnerability is a command injection issue caused by improper neutralization of special elements used in a command within GitHub Copilot and Visual Studio Code.
It allows an authorized attacker to execute commands that can lead to the disclosure of information over a network.
How can this vulnerability impact me? :
The vulnerability can lead to information disclosure, meaning sensitive or confidential data could be exposed to unauthorized parties over a network.