Major Open VSX Registry Vulnerability Puts Millions of Developers at Risk of Supply Chain Attacks

Published:

spot_img

Jun 26, 2025Ravie LakshmananOpen Source / Vulnerability

Critical Vulnerability Discovered in Open VSX Registry

Recent findings from cybersecurity researchers have unveiled a significant vulnerability in the Open VSX Registry, known as “open-vsx[.]org.” This flaw, if leveraged by malicious actors, could allow unauthorized control over the entire Visual Studio Code extensions marketplace, creating a serious supply chain risk for developers and companies alike.

The Scope of the Vulnerability

Oren Yomtov, a researcher at Koi Security, highlighted the severity of the situation, stating that this vulnerability could permit attackers to exercise complete control over millions of developer machines. By exploiting a weakness in the continuous integration (CI) process, a malicious user could potentially push harmful updates to every extension available in the Open VSX marketplace.

Following a responsible disclosure on May 4, 2025, several rounds of fixes were initiated by the maintainers of the registry, culminating in a final update on June 25.

Understanding Open VSX Registry

The Open VSX Registry is an open-source alternative to the Visual Studio Marketplace, managed by the Eclipse Foundation. Several popular code editors—including Cursor, Windsurf, Google Cloud Shell Editor, and Gitpod—integrate Open VSX, which increases its reach and potential impact in the development community.

Yomtov noted the expansive integration of Open VSX, cautioning that a compromise here could pose a “supply-chain nightmare.” Given the frequency with which extensions are installed and updated through this platform, the risk is particularly alarming.

Source of the Vulnerability

The vulnerability identified by Koi Security is linked to the publish-extensions repository, which contains scripts designed to publish open-source VS Code extensions on the Open VSX platform. Developers can request their extensions to be auto-published by submitting updates to the extensions.json file in the repository. Once approved, a daily GitHub Actions workflow automates the publication process at 03:03 a.m. UTC.

This workflow employs privileged credentials, containing a secret token—the OVSX_PAT—linked to the @open-vsx service account, enabling it to publish or overwrite any extension within the marketplace. “In theory, this token should only be accessible to trusted code,” Yomtov explained.

The Implications of Arbitrariness

A critical concern arises from how npm install operates. It executes arbitrary build scripts related to all auto-published extensions, granting them access to the OVSX_PAT environment variable. This loophole means that an attacker could potentially seize the @open-vsx account’s token, thereby gaining privileged access to the Open VSX Registry. The consequences of such access include the ability to introduce malicious code into existing extensions or create new, harmful ones.

The Security Landscape

The threat posed by extensions has drawn attention from organizations like MITRE, which has recognized the potential for exploitation in its ATT&CK framework by introducing a new “IDE Extensions” technique as of April 2025. This technique can be misused by malicious actors to maintain persistent access to compromised systems.

Yomtov emphasized the inherent risks of every item in a marketplace like Open VSX, describing all marketplace contributions as potential backdoors. Since they are unvetted software dependencies with elevated access, proper scrutiny is necessary—akin to the diligence required for any package sourced from PyPI, npm, or GitHub. Failure to address these vulnerabilities could result in a sprawling, hidden supply chain increasingly targeted by attackers.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.
spot_img

Related articles

Recent articles

Webinar: Uncovering Suspicious APK Files in Wedding Card and Loan App Scams

The surge of malicious APK files in cyber fraud schemes, such as fake wedding invitations and instant loan applications, has become a growing concern....

Skylon Partners with COBNB to Launch COBNB+ Featuring L’Occitane en Provence Hotel Amenities

Skylon Partners with COBNB for a Luxurious Hospitality Experience in Kuala Lumpur Introduction to the New Partnership In an exciting development for the hospitality scene in...

Understanding CISA KEV: Key Insights and Tools for Security Teams

Understanding the CISA Known Exploited Vulnerability (KEV) Catalog The Cybersecurity and Infrastructure Security Agency (CISA) maintains the Known Exploited Vulnerability (KEV) catalog, a resource designed...

Dark Web Leak Sparks WFH Job Scams; Prayagraj Police Freeze ₹2 Crore in Fraudulent Funds

Rising Cybercrime in Prayagraj: A New Target Shifting Tactics of Cybercriminals In Prayagraj, the landscape of cybercrime is evolving. Previously, scammers predominantly targeted victims through enticing...