AI description
CVE-2025-53773 is a vulnerability in GitHub Copilot that allows for remote code execution and full system compromise through prompt injection techniques. The vulnerability lies in GitHub Copilot's ability to modify project files without explicit user approval, specifically targeting the `.vscode/settings.json` configuration file. By injecting malicious prompts into various sources like source code files, web pages, or GitHub issues, an attacker can trick Copilot into adding `"chat.tools.autoApprove": true` to the settings file. This effectively puts the AI assistant into "YOLO mode", disabling user confirmations and allowing it to execute shell commands, browse the web, and perform other privileged actions without oversight, leading to potential system compromise.
- Description
- Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute code locally.
- Source
- secure@microsoft.com
- NVD status
- Analyzed
- Products
- visual_studio_2022
CVSS 3.1
- Type
- Secondary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- secure@microsoft.com
- CWE-77
- Hype score
- Not currently trending
#MLSecOps Prompt Injection Attacks Part 1: Prompt Injection - Exploiting LLM Instruction Confusion - https://t.co/EFQr0YH7Lv Part 2: Wormable Prompt Injections - Self-Replicating Exploits in AI - https://t.co/M5ZxrGhoIM Part 3: CVE-2025-53773 - Visual Studio & Copilot - Worma
@ksg93rd
17 Aug 2025
26 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
GitHub Copilot: Remote Code Execution via Prompt Injection (CVE-2025-53773) https://t.co/ejBuxoYz2h
@HackingTeam777
15 Aug 2025
688 Impressions
1 Retweet
15 Likes
5 Bookmarks
0 Replies
0 Quotes
「GitHub Copilotに潜むリモートコード実行脆弱性」──プロンプトインジェクションによるRCE脆弱性「CVE-2025-53773」が発見。YOLOモードを悪用し開発者端末を完全制御可能。AI開発ツールのセキュリティリスク。要
@t3_corp
15 Aug 2025
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Falha crítica no GitHub Copilot (CVE-2025-53773) permitia que hackers usassem prompt injection para ativar o “YOLO mode” e executar comandos sem autorização, comprometendo Windows, macOS e Linux. 👉 https://t.co/Zuj1WHCOiL https://t.co/utOoYZa3Pa
@TechStartXYZ
13 Aug 2025
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
GitHub Copilotに致命的なセキュリティ脆弱性が公開された(CVE-2025-53773)。洗練されたプロンプトインジェクションテクニックによってリモートでコードを実行し、システムを完全に侵害する可能性がある。 これは
@yousukezan
13 Aug 2025
10033 Impressions
30 Retweets
68 Likes
47 Bookmarks
0 Replies
1 Quote
GitHub Copilotにプロンプトインジェクションによる遠隔コード実行の脆弱性。8月のMS月例パッチで緊急(Critical)扱いで修正。CVE-2025-53773は間接プロンプトインジェクションにより、設定ファイルでYOLOモード(ユー
@__kokumoto
13 Aug 2025
2842 Impressions
4 Retweets
13 Likes
1 Bookmark
0 Replies
1 Quote
【AIツールセキュリティ】GitHub CopilotにCVE-2025-53773として追跡される重大な脆弱性が発見され、プロンプトインジェクションを通じてリモートコード実行が可能となることが判明した。
@nakajimeeee
13 Aug 2025
805 Impressions
0 Retweets
11 Likes
9 Bookmarks
0 Replies
0 Quotes
Github Copilot Remote Code Execution CVE-2025-53773 via prompt injection https://t.co/GdPzOiZB2x
@0xJin
13 Aug 2025
1568 Impressions
1 Retweet
21 Likes
4 Bookmarks
1 Reply
0 Quotes
💥 Remote Code Execution in GitHub Copilot (CVE-2025-53773) 👉 Prompt injection exploit writes to Copilot config file and puts it into YOLO mode, then we get immediate RCE 🔥 Bypasses all user approvals 🛡️ Patch is out today. Update before someone else does it for
@wunderwuzzi23
12 Aug 2025
69447 Impressions
134 Retweets
667 Likes
379 Bookmarks
9 Replies
11 Quotes
CVE-2025-53773 Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute cod… https://t.co/I1zKyzufyq
@CVEnew
12 Aug 2025
317 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E5799F24-B0F2-461D-97D5-FED4D23BAC19",
"versionEndExcluding": "17.14.12",
"versionStartIncluding": "17.14.0"
}
],
"operator": "OR"
}
]
}
]