Nov 2025: Agentic AI and Visual Studio Code Remote Code Execution Vulnerability
CVE-2025-62222 Published on November 11, 2025

Agentic AI and Visual Studio Code Remote Code Execution Vulnerability
Improper neutralization of special elements used in a command ('command injection') in Visual Studio Code CoPilot Chat Extension allows an unauthorized attacker to execute code over a network.

Vendor Advisory NVD

Weakness Types

What is a Command Injection Vulnerability?

The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.

CVE-2025-62222 has been classified to as a Command Injection vulnerability or weakness.

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.


Products Associated with CVE-2025-62222

Want to know whenever a new CVE is published for Microsoft Visual Studio Code Copilot Chat Extension? stack.watch will email you.

 

Affected Versions

Microsoft Visual Studio Code CoPilot Chat Extension:

Exploit Probability

EPSS
0.22%
Percentile
43.91%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.