[CIVN-2025-0366] Remote Code Execution Vulnerability in GitHub Copilot for JetBrains

By Published On: December 16, 2025

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Remote Code Execution Vulnerability in GitHub Copilot for JetBrains 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
GitHub Copilot Plugin for JetBrains IDEs
Overview
A vulnerability has been reported in the GitHub Copilot extension for JetBrains IDEs, which may allow a local attacker to execute arbitrary code on the targeted vulnerable system.
Target Audience:
All developer organizations, software teams, and individuals using JetBrains IDEs with the GitHub Copilot plugin installed.
Risk Assessment:
High risk of arbitrary code execution and compromise of the development environment.
Impact Assessment:
Potential for complete compromise of the developer¿s workstation, unauthorized code changes, credential theft, and spread to connected repositories or build systems.
Description
The vulnerability exists due to improper neutralisation of special characters used in command execution within the GitHub Copilot plugin for JetBrains.
An attacker could exploit this vulnerability by introducing malicious input¿such as crafted file content, project artifacts, or injected text¿that the plugin processes without adequate sanitization.
Successful exploitation could allow arbitrary command execution in the context of the logged-in user, enabling further system compromise.
Solution
Apply appropriate updates as mentioned as mentioned by the Vendor:
https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-64671
Vendor Information
Microsoft
https://msrc.microsoft.com/update-guide/
References
 
https://www.cve.org/CVERecord?id=CVE-2025-64671
CVE Name
CVE-2025-64671
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=nxrv
—–END PGP SIGNATURE—–

Share this article