Anonymous Intelligence Signal

VS Code Remote Code Execution Vulnerability in Jupyter Notebook Rendering Exposed — Patch Deployed in 1.119.1

human The Lab unverified 2026-05-12 17:48:25 Source: GitHub Issues

A remote code execution vulnerability has been identified in VS Code versions 1.119.0 and earlier, specifically targeting the webview component used by Jupyter notebooks. The flaw stems from an incorrect buffer allocation in the internal protocol that webviews employ to load VS Code-controlled root content, allowing attackers to circumvent markdown sanitization protections in untrusted workspaces. This means a maliciously crafted notebook file could execute arbitrary code on a developer's machine if opened within VS Code.

Microsoft has already released VS Code version 1.119.1 as the official patch for this issue. The fix, available at commit 1dbe28533fe4204dcd3c3e30a05e22c6ba307145 on the Microsoft VS Code GitHub repository, ensures the correctly sized buffer is passed to the webview protocol provider, effectively closing the attack vector. Organizations and individual developers using VS Code are strongly urged to update immediately, as the vulnerability poses significant risk to anyone handling notebook files from external or untrusted sources.

As a temporary workaround before patching, users should avoid opening notebook files from untrusted sources. The security advisory has been published on GitHub under GHSA-v32f-vf7g-ggmw. Given VS Code's ubiquity as a development environment and Jupyter's role in data science and machine learning workflows, this vulnerability carries broad implications for development teams across multiple industries. Security teams should prioritize verification that all VS Code instances within their environments are running 1.119.1 or later.