{"id":4789,"date":"2025-07-01T15:11:35","date_gmt":"2025-07-01T15:11:35","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/07\/01\/new-flaw-in-ides-like-visual-studio-code-lets-malicious-extensions-bypass-verified-status\/"},"modified":"2025-07-01T15:11:35","modified_gmt":"2025-07-01T15:11:35","slug":"new-flaw-in-ides-like-visual-studio-code-lets-malicious-extensions-bypass-verified-status","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/07\/01\/new-flaw-in-ides-like-visual-studio-code-lets-malicious-extensions-bypass-verified-status\/","title":{"rendered":"New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status"},"content":{"rendered":"<p>\u200bA new study of integrated development environments (IDEs) like Microsoft Visual Studio Code, Visual Studio, IntelliJ IDEA, and Cursor has revealed weaknesses in how they handle the extension verification process, ultimately enabling attackers to execute malicious code on developer machines.<br \/>\n&#8220;We discovered that flawed verification checks in Visual Studio Code allow publishers to add functionality\u00a0A new study of integrated development environments (IDEs) like Microsoft Visual Studio Code, Visual Studio, IntelliJ IDEA, and Cursor has revealed weaknesses in how they handle the extension verification process, ultimately enabling attackers to execute malicious code on developer machines.<br \/>\n&#8220;We discovered that flawed verification checks in Visual Studio Code allow publishers to add functionality\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bA new study of integrated development environments (IDEs) like Microsoft Visual Studio Code, Visual Studio, IntelliJ IDEA, and Cursor has revealed weaknesses in how they handle the extension verification process, ultimately enabling attackers to execute malicious code on developer machines. &#8220;We discovered that flawed verification checks in Visual Studio Code allow publishers to add functionality\u00a0A&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/07\/01\/new-flaw-in-ides-like-visual-studio-code-lets-malicious-extensions-bypass-verified-status\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":4790,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4789"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=4789"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4789\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/4790"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=4789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=4789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=4789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}