Jul 2025: Visual Studio Code Python Extension Remote Code Execution Vulnerability
CVE-2025-49714 Published on July 8, 2025

Visual Studio Code Python Extension Remote Code Execution Vulnerability
Trust boundary violation in Visual Studio Code - Python extension allows an unauthorized attacker to execute code locally.

Vendor Advisory NVD

Weakness Type

Trust Boundary Violation

The product mixes trusted and untrusted data in the same data structure or structured message. A trust boundary can be thought of as line drawn through a program. On one side of the line, data is untrusted. On the other side of the line, data is assumed to be trustworthy. The purpose of validation logic is to allow data to safely cross the trust boundary - to move from untrusted to trusted. A trust boundary violation occurs when a program blurs the line between what is trusted and what is untrusted. By combining trusted and untrusted data in the same data structure, it becomes easier for programmers to mistakenly trust unvalidated data.


Products Associated with CVE-2025-49714

stack.watch emails you whenever new vulnerabilities are published in Microsoft Python or Microsoft Visual Studio Code. Just hit a watch button to start following.

 
 

Affected Versions

Microsoft Python extension for Visual Studio Code:

Exploit Probability

EPSS
0.11%
Percentile
29.28%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.