Closed
Description
A remote code execution vulnerability exists in VS Code 1.99.0 and earlier versions where another user within the same group could edit the $ZDOTDIR and have extra code executed in the integrated zshell.
Patches
The fix is available starting with VS Code 1.99.1. The fix (2f2e2c4) prevents this attack by setting the sticky bit and remove group and other permissions to restrict the folder to the user that created it.
Workarounds
Disable shell integration in VS Code by setting "terminal.integrated.shellIntegration.enabled": false
or do not open a zshell within VS Code.
References
- The patch for this can be found at 2f2e2c4
- An advisory for this can be found at GHSA-hwrx-jgf2-74hw
- MSRC details for this can be found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-20570