Visual Studio 2022

23 CVEs product

Monthly

CVE-2026-21257 HIGH This Week

GitHub Copilot and Visual Studio 2022 contain a command injection vulnerability that allows authenticated users to execute arbitrary commands through improper sanitization of special elements. An attacker with valid credentials can leverage user interaction to escalate privileges and gain elevated access across the network. No patch is currently available for this vulnerability.

Github Command Injection AI / ML Visual Studio 2022
NVD
CVSS 3.1
8.0
EPSS
0.0%
CVE-2026-21256 HIGH This Week

Remote code execution in GitHub Copilot and Visual Studio 2022 via command injection allows unauthenticated attackers to execute arbitrary code over the network with user interaction. The vulnerability stems from improper sanitization of special elements in commands, enabling attackers to break out of intended command contexts and inject malicious payloads. No patch is currently available for this high-severity issue affecting both development environments.

Github Command Injection AI / ML Visual Studio 2022
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2025-62214 MEDIUM This Month

Improper neutralization of special elements used in a command ('command injection') in Visual Studio allows an authorized attacker to execute code locally. Rated medium severity (CVSS 6.7). No vendor patch available.

Command Injection Visual Studio 2022
NVD
CVSS 3.1
6.7
EPSS
0.1%
CVE-2025-53773 HIGH POC This Month

Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Command Injection Visual Studio 2022
NVD
CVSS 3.1
7.8
EPSS
0.7%
CVE-2025-49739 HIGH This Week

Improper link resolution before file access ('link following') in Visual Studio allows an unauthorized attacker to elevate privileges over a network.

Authentication Bypass Visual Studio 2017 Visual Studio Visual Studio 2022 Visual Studio 2019
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-47959 HIGH This Week

Command injection vulnerability in Visual Studio that allows an authenticated attacker with local user interaction to execute arbitrary code over a network with high impact on confidentiality, integrity, and availability. While the vulnerability requires prior authorization and user interaction, successful exploitation could lead to complete system compromise. No public indication of active exploitation or widespread POC availability is currently documented, but the CVSS 7.1 score reflects significant risk in collaborative development environments where multiple authorized users access shared Visual Studio instances.

Command Injection Microsoft Windows RCE Visual Studio 2022
NVD
CVSS 3.1
7.1
EPSS
0.2%
CVE-2025-30399 HIGH PATCH This Week

CVE-2025-30399 is an untrusted search path vulnerability in .NET and Visual Studio that allows unauthenticated remote attackers to execute arbitrary code through a network vector, requiring user interaction. The vulnerability affects multiple versions of .NET Framework and Visual Studio across Windows platforms. While the CVSS score is 7.5 (high), the attack complexity is high and requires user interaction, potentially limiting real-world exploitation frequency.

Microsoft Dotnet RCE Powershell Visual Studio 2022 +3
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-26646 HIGH PATCH This Week

External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network. Rated high severity (CVSS 8.0), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Build Tools Visual Studio 2022 Net Redhat +1
NVD
CVSS 3.1
8.0
EPSS
0.3%
CVE-2025-32703 MEDIUM This Month

Insufficient granularity of access control in Visual Studio allows an authorized attacker to disclose information locally. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.

Information Disclosure Visual Studio 2017 Visual Studio 2019 Visual Studio 2022
NVD
CVSS 3.1
5.5
EPSS
0.8%
CVE-2025-32702 HIGH This Week

Improper neutralization of special elements used in a command ('command injection') in Visual Studio allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Command Injection Visual Studio 2019 Visual Studio 2022
NVD
CVSS 3.1
7.8
EPSS
0.9%
CVE-2025-29804 HIGH This Week

Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.

Authentication Bypass Visual Studio 2022
NVD
CVSS 3.1
7.3
EPSS
0.6%
CVE-2025-29802 HIGH This Week

Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.

Information Disclosure Visual Studio 2022
NVD
CVSS 3.1
7.3
EPSS
0.6%
CVE-2025-26682 HIGH Act Now

Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 47.0% and no vendor patch available.

Denial Of Service Asp Net Core Visual Studio 2022 Redhat
NVD
CVSS 3.1
7.5
EPSS
47.0%
CVE-2025-21206 HIGH PATCH This Week

Visual Studio Installer Elevation of Privilege Vulnerability. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity.

Information Disclosure Visual Studio 2017 Visual Studio 2019 Visual Studio 2022
NVD
CVSS 3.1
7.3
EPSS
0.4%
CVE-2025-21405 HIGH PATCH This Month

Visual Studio Elevation of Privilege Vulnerability. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity.

Authentication Bypass Visual Studio 2022
NVD
CVSS 3.1
7.3
EPSS
0.4%
CVE-2025-21178 HIGH PATCH This Month

Visual Studio Remote Code Execution Vulnerability. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity.

Heap Overflow Buffer Overflow RCE Visual Studio 2017 Visual Studio 2019 +1
NVD
CVSS 3.1
8.8
EPSS
0.4%
CVE-2025-21173 HIGH PATCH This Month

.NET Elevation of Privilege Vulnerability. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.

Information Disclosure Visual Studio 2022 Net Redhat Suse
NVD HeroDevs
CVSS 3.1
7.3
EPSS
2.0%
CVE-2025-21172 HIGH PATCH This Month

.NET and Visual Studio Remote Code Execution Vulnerability. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Heap Overflow Buffer Overflow RCE Net Visual Studio 2017 +4
NVD HeroDevs
CVSS 3.1
7.5
EPSS
0.4%
CVE-2025-21171 HIGH PATCH This Month

.NET Remote Code Execution Vulnerability. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Heap Overflow Buffer Overflow RCE Net Powershell +3
NVD
CVSS 3.1
7.5
EPSS
0.6%
CVE-2024-21319 MEDIUM PATCH This Month

Microsoft Identity Denial of service vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is remotely exploitable, low attack complexity.

Microsoft Denial Of Service Net Identity Model Visual Studio 2022
NVD
CVSS 3.1
6.8
EPSS
0.6%
CVE-2024-20656 HIGH PATCH This Month

Visual Studio contains an elevation of privilege vulnerability that allows local attackers to escalate privileges through symlink exploitation. Successful exploitation grants elevated permissions on the development workstation, potentially compromising the software supply chain.

Information Disclosure Visual Studio Visual Studio 2017 Visual Studio 2019 Visual Studio 2022
NVD
CVSS 3.1
7.8
EPSS
54.3%
CVE-2024-0057 CRITICAL PATCH This Week

NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity.

Authentication Bypass Powershell Visual Studio 2022 Net Framework Net
NVD
CVSS 3.1
9.1
EPSS
3.6%
CVE-2024-0056 HIGH PATCH This Month

Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required.

Microsoft Authentication Bypass Microsoft Data Sqlclient Sql Server System Data Sqlclient +3
NVD
CVSS 3.1
8.7
EPSS
0.9%
CVE-2026-21257
EPSS 0% CVSS 8.0
HIGH This Week

GitHub Copilot and Visual Studio 2022 contain a command injection vulnerability that allows authenticated users to execute arbitrary commands through improper sanitization of special elements. An attacker with valid credentials can leverage user interaction to escalate privileges and gain elevated access across the network. No patch is currently available for this vulnerability.

Github Command Injection AI / ML +1
NVD
CVE-2026-21256
EPSS 0% CVSS 8.8
HIGH This Week

Remote code execution in GitHub Copilot and Visual Studio 2022 via command injection allows unauthenticated attackers to execute arbitrary code over the network with user interaction. The vulnerability stems from improper sanitization of special elements in commands, enabling attackers to break out of intended command contexts and inject malicious payloads. No patch is currently available for this high-severity issue affecting both development environments.

Github Command Injection AI / ML +1
NVD
CVE-2025-62214
EPSS 0% CVSS 6.7
MEDIUM This Month

Improper neutralization of special elements used in a command ('command injection') in Visual Studio allows an authorized attacker to execute code locally. Rated medium severity (CVSS 6.7). No vendor patch available.

Command Injection Visual Studio 2022
NVD
CVE-2025-53773
EPSS 1% CVSS 7.8
HIGH POC This Month

Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Command Injection Visual Studio 2022
NVD
CVE-2025-49739
EPSS 0% CVSS 8.8
HIGH This Week

Improper link resolution before file access ('link following') in Visual Studio allows an unauthorized attacker to elevate privileges over a network.

Authentication Bypass Visual Studio 2017 Visual Studio +2
NVD
CVE-2025-47959
EPSS 0% CVSS 7.1
HIGH This Week

Command injection vulnerability in Visual Studio that allows an authenticated attacker with local user interaction to execute arbitrary code over a network with high impact on confidentiality, integrity, and availability. While the vulnerability requires prior authorization and user interaction, successful exploitation could lead to complete system compromise. No public indication of active exploitation or widespread POC availability is currently documented, but the CVSS 7.1 score reflects significant risk in collaborative development environments where multiple authorized users access shared Visual Studio instances.

Command Injection Microsoft Windows +2
NVD
CVE-2025-30399
EPSS 0% CVSS 7.5
HIGH PATCH This Week

CVE-2025-30399 is an untrusted search path vulnerability in .NET and Visual Studio that allows unauthenticated remote attackers to execute arbitrary code through a network vector, requiring user interaction. The vulnerability affects multiple versions of .NET Framework and Visual Studio across Windows platforms. While the CVSS score is 7.5 (high), the attack complexity is high and requires user interaction, potentially limiting real-world exploitation frequency.

Microsoft Dotnet RCE +5
NVD GitHub
CVE-2025-26646
EPSS 0% CVSS 8.0
HIGH PATCH This Week

External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network. Rated high severity (CVSS 8.0), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Build Tools Visual Studio 2022 +3
NVD
CVE-2025-32703
EPSS 1% CVSS 5.5
MEDIUM This Month

Insufficient granularity of access control in Visual Studio allows an authorized attacker to disclose information locally. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.

Information Disclosure Visual Studio 2017 Visual Studio 2019 +1
NVD
CVE-2025-32702
EPSS 1% CVSS 7.8
HIGH This Week

Improper neutralization of special elements used in a command ('command injection') in Visual Studio allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Command Injection Visual Studio 2019 Visual Studio 2022
NVD
CVE-2025-29804
EPSS 1% CVSS 7.3
HIGH This Week

Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.

Authentication Bypass Visual Studio 2022
NVD
CVE-2025-29802
EPSS 1% CVSS 7.3
HIGH This Week

Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.

Information Disclosure Visual Studio 2022
NVD
CVE-2025-26682
EPSS 47% CVSS 7.5
HIGH Act Now

Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 47.0% and no vendor patch available.

Denial Of Service Asp Net Core Visual Studio 2022 +1
NVD
CVE-2025-21206
EPSS 0% CVSS 7.3
HIGH PATCH This Week

Visual Studio Installer Elevation of Privilege Vulnerability. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity.

Information Disclosure Visual Studio 2017 Visual Studio 2019 +1
NVD
CVE-2025-21405
EPSS 0% CVSS 7.3
HIGH PATCH This Month

Visual Studio Elevation of Privilege Vulnerability. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity.

Authentication Bypass Visual Studio 2022
NVD
CVE-2025-21178
EPSS 0% CVSS 8.8
HIGH PATCH This Month

Visual Studio Remote Code Execution Vulnerability. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity.

Heap Overflow Buffer Overflow RCE +3
NVD
CVE-2025-21173
EPSS 2% CVSS 7.3
HIGH PATCH This Month

.NET Elevation of Privilege Vulnerability. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.

Information Disclosure Visual Studio 2022 Net +2
NVD HeroDevs
CVE-2025-21172
EPSS 0% CVSS 7.5
HIGH PATCH This Month

.NET and Visual Studio Remote Code Execution Vulnerability. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Heap Overflow Buffer Overflow RCE +6
NVD HeroDevs
CVE-2025-21171
EPSS 1% CVSS 7.5
HIGH PATCH This Month

.NET Remote Code Execution Vulnerability. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Heap Overflow Buffer Overflow RCE +5
NVD
CVE-2024-21319
EPSS 1% CVSS 6.8
MEDIUM PATCH This Month

Microsoft Identity Denial of service vulnerability. Rated medium severity (CVSS 6.8), this vulnerability is remotely exploitable, low attack complexity.

Microsoft Denial Of Service Net +2
NVD
CVE-2024-20656
EPSS 54% CVSS 7.8
HIGH PATCH This Month

Visual Studio contains an elevation of privilege vulnerability that allows local attackers to escalate privileges through symlink exploitation. Successful exploitation grants elevated permissions on the development workstation, potentially compromising the software supply chain.

Information Disclosure Visual Studio Visual Studio 2017 +2
NVD
CVE-2024-0057
EPSS 4% CVSS 9.1
CRITICAL PATCH This Week

NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity.

Authentication Bypass Powershell Visual Studio 2022 +2
NVD
CVE-2024-0056
EPSS 1% CVSS 8.7
HIGH PATCH This Month

Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required.

Microsoft Authentication Bypass Microsoft Data Sqlclient +5
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy