CVE-2026-28353

Source
https://cve.org/CVERecord?id=CVE-2026-28353
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-28353.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-28353
Aliases
  • GHSA-8mr6-gf9x-j8qg
Published
2026-03-05T20:02:59.865Z
Modified
2026-03-13T07:57:12.184562Z
Severity
  • 10.0 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H CVSS Calculator
Summary
Trivy Vulnerability Scanner: Unauthorized AI Agent Execution Code Included in OpenVSX Extension Release
Details

Trivy Vulnerability Scanner is a VS Code extension that helps find vulnerabilities. In Trivy VSCode Extension version 1.8.12, which was distributed via OpenVSX marketplace was compromised and contained malicious code designed to leverage local AI coding agent to collect and exfiltrate sensitive information. Users using the affected artifact are advised to immediately remove it and rotate environment secrets. The malicious artifact has been removed from the marketplace. No other affected artifacts have been identified.

Database specific
{
    "cwe_ids": [
        "CWE-506"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/28xxx/CVE-2026-28353.json"
}
References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-28353.json"