CVE-2025-65717: [PoC]
CVE-2025-65717
An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page....
Overview
A critical security vulnerability has been identified in the popular “Live Server” extension for Visual Studio Code. This extension, used by developers to launch a local development web server with live reload capability, contains a flaw that could allow an attacker to steal sensitive files from a developer’s computer.
Vulnerability in Simple Terms
When a developer uses the affected version of the Live Server extension, it starts a local web server to preview their project. Due to a flaw in this version, if a developer is tricked into opening a specially crafted HTML page with this server running, that malicious page can silently send files from the developer’s project directory-and potentially other accessible locations-to an attacker-controlled server. This exploitation requires the developer to interact with the page (e.g., click on it), but no further warnings are given.
Potential Impact
The impact of this vulnerability is severe. Successful exploitation could lead to:
- Source Code Theft: Exfiltration of proprietary application source code, intellectual property, or internal tools.
- Credential Leakage: Theft of configuration files that may contain API keys, database passwords, or other secrets often stored within project directories.
- Data Breach: Unauthorized access to sensitive data files being used in the development or testing environment. The high severity score (CVSS 9.1) reflects the low attack complexity and the high potential for loss of confidentiality.
Remediation and Mitigation Advice
Immediate action is required to secure development environments.
-
Update Immediately: The primary fix is to update the Live Server extension to the latest version. The extension maintainer has released a patched version. Open VS Code, go to the Extensions view (Ctrl+Shift+X), find “Live Server,” and ensure it is updated to version 5.7.10 or later.
-
Mitigation for Unpatched Systems: If updating is not immediately possible, the risk can be significantly reduced by:
- Stopping the Live Server when it is not actively needed for previewing work.
- Avoiding Unknown HTML Files: Do not open or preview HTML files from untrusted sources while the Live Server is active.
- Using Alternative Tools: Consider temporarily using a different local development server or VS Code extension until the update can be applied.
-
General Security Hygiene:
- Regularly audit project folders for sensitive files like
.envfiles or private keys. Use.gitignoreappropriately. - Consider using secret management tools instead of storing credentials in plain text within project directories.
- Regularly audit project folders for sensitive files like
All developers and IT administrators managing development workstations should verify the extension version and apply this update as a critical priority.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Public PoC References
Unverified third-party code
These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).
Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.
| Repository | Stars |
|---|---|
| natsuki-engr/live-server-evil-crawler Live Server VSCode Vulnerability (CVE-2025-65717) Demo | ★ 0 |
Showing 1 of 1 known references. Source: nomi-sec/PoC-in-GitHub.
Related Advisories
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, Mermaid diagrams are rendered with securityLevel set to "loose", and the resulting SVG is injected into the ...
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerab...
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerab...
Adobe Connect versions 2025.3, 12.10 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this issue by manipulating the DOM environment to execu...