We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-6705



Description

On open-vsx.org https://open-vsx.org/  it was possible to run an arbitrary build scripts for auto-published extensions because of missing sandboxing of CI job runs. An attacker who had access to an existing extension could take over the service account of the marketplace. The issue has been fixed on June 24th, 2025 and the vulnerable code present in the publish-extension code repository.

Reserved 2025-06-26 | Published 2025-06-27 | Updated 2025-06-27 | Assigner eclipse


HIGH: 7.6CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-913 Improper Control of Dynamically-Managed Code Resources

CWE-653 Improper Isolation or Compartmentalization

Product status

Default status
unaffected

date < 20250624
affected

Credits

Oren Yomtov reporter

References

open-vsx.org product

github.com/EclipseFdn/publish-extensions/pull/881 patch

cve.org (CVE-2025-6705)

nvd.nist.gov (CVE-2025-6705)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-6705

Support options

Helpdesk Chat, Email, Knowledgebase