CVE-2025-53773
📊 7.8 HIGH⚡ 0.5%🎯 1 exploits
📅 Published Aug 12, 2025
📋 Status: Analyzed
Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute code locally.
CVSS v3.1 • [email protected]
🎯 Affected Products & Systems
1 product configurations affected
Filter by type:
| Type | Vendor | Product | Version Range | Status | CPE String |
|---|---|---|---|---|---|
📱App | microsoft | visual studio 2022 | ≥ 17.14.0 ∧ < 17.14.12 | Vulnerable | cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* |
📱
VulnerableApplication
Version: ≥ 17.14.0 ∧ < 17.14.12
CPE:
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
Metrics
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector:
LOCAL
Complexity:
LOW
Privileges:
NONE
User Interaction:
REQUIRED
Confidentiality:
HIGH
Integrity:
HIGH
Availability:
HIGH
Scope:
UNCHANGED
🔍 Technical Details
Analysis Status
AnalyzedCVSS Details
7.8 (HIGH)v3.1
Source: [email protected]
EPSS Details
0.5% (Minimal)67.1th percentile
Last updated: Nov 1, 2025
Exploitation probability within 30 days
Published Date
Aug 12, 2025 (2 months ago)
Last Modified
Aug 15, 2025 (2 months ago)
Security Weaknesses1
CWE-77
Available exploits (1)
References3
NVDadvisorygeneral