Vulnerability DatabaseGHSA-9f65-56v6-gxw7

GHSA-9f65-56v6-gxw7
JavaScript vulnerability analysis and mitigation

Overview

Claude Code, an agentic coding tool, was found to have a critical vulnerability (CVE-2025-52882) affecting its IDE extensions. The vulnerability affects Claude Code for VSCode IDE extensions versions 0.2.116 through 1.0.23 and Claude Code [beta] versions 0.1.1 through 0.1.8 for JetBrains IDEs. The issue was discovered and patched on June 13th, 2025, with the vulnerability being publicly disclosed on June 23rd, 2025. The vulnerability allows unauthorized websocket connections from attacker-controlled webpages in VSCode and its forks (Cursor, Windsurf, VSCodium) as well as JetBrains IDEs (IntelliJ, Pycharm, Android Studio) (GitHub Advisory).

Technical details

The vulnerability is classified as CWE-1385 (Missing Origin Validation in WebSockets) and received a CVSS v4.0 base score of 8.8 (High). The technical assessment indicates the vulnerability has Network attack vector, Low attack complexity, requires Present attack requirements, No privileges required, and Passive user interaction. The vulnerability impacts both Confidentiality and Integrity with High severity, while having No impact on Availability for both vulnerable and subsequent systems (NVD).

Impact

In VSCode and its forks, successful exploitation enables attackers to read arbitrary files, access lists of open files, obtain selection and diagnostics events from the IDE, and potentially execute code in scenarios where users have open Jupyter Notebooks and accept malicious prompts. For JetBrains IDEs, the impact is limited to obtaining selection events, accessing lists of open files, and viewing syntax error lists (GitHub Advisory).

Mitigation and workarounds

Users should update their IDE extensions to patched versions: VSCode users should update to version 1.0.24 or later, while JetBrains IDE users should update to version 0.1.9 [Beta] or later. For VSCode and forks, users can update through View->Extensions, locate Claude Code for VSCode, and update or uninstall versions prior to 1.0.24. For JetBrains IDEs, users should open the Plugins list, locate Claude Code [Beta], and update or uninstall versions prior to 0.1.9. A restart of the IDE is required after updating (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23947CRITICAL9.3
  • JavaScriptJavaScript
  • @orval/core
NoYesJan 20, 2026
CVE-2026-23950HIGH8.8
  • JavaScriptJavaScript
  • grafana-graphite
NoYesJan 20, 2026
CVE-2026-22037HIGH8.4
  • JavaScriptJavaScript
  • @fastify/express
NoYesJan 19, 2026
CVE-2026-23522LOW3.7
  • JavaScriptJavaScript
  • @lobehub/chat
NoNoJan 19, 2026
CVE-2025-66803LOW1.7
  • JavaScriptJavaScript
  • @hotwired/turbo
NoYesJan 20, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management