CVE-2024-48141

7.5 HIGH

📋 TL;DR

A prompt injection vulnerability in Zhipu AI CodeGeeX allows attackers to access and exfiltrate all chat data between users and the AI assistant through crafted messages. This affects users of CodeGeeX v2.17.0 in Visual Studio Code, potentially exposing sensitive conversation history.

💻 Affected Systems

Products:
  • Zhipu AI CodeGeeX
Versions: v2.17.0
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Visual Studio Code extension version 2.17.0; earlier versions may also be vulnerable but not confirmed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all chat history including potentially sensitive code, credentials, or proprietary information being exfiltrated to attacker-controlled systems.

🟠

Likely Case

Unauthorized access to chat history containing code snippets, debugging conversations, and potentially sensitive project information.

🟢

If Mitigated

Limited exposure if chat data contains only non-sensitive information and proper network segmentation prevents exfiltration.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a crafted message to the chat interface; no authentication or special privileges needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.18.0 or later

Vendor Advisory: https://marketplace.visualstudio.com/items?itemName=aminer.codegeex

Restart Required: Yes

Instructions:

1. Open Visual Studio Code. 2. Go to Extensions view. 3. Search for CodeGeeX. 4. Click Update to v2.18.0+. 5. Restart Visual Studio Code.

🔧 Temporary Workarounds

Disable CodeGeeX Extension

all

Temporarily disable the vulnerable extension until patched.

code --disable-extension aminer.codegeex

Network Segmentation

all

Block outgoing connections from development machines to prevent data exfiltration.

🧯 If You Can't Patch

  • Disable the CodeGeeX extension completely
  • Use network controls to block all outgoing connections from development workstations

🔍 How to Verify

Check if Vulnerable:

Check CodeGeeX extension version in VS Code Extensions view; if version is 2.17.0, system is vulnerable.

Check Version:

code --list-extensions --show-versions | findstr codegeex

Verify Fix Applied:

Verify CodeGeeX extension version is 2.18.0 or higher in VS Code Extensions view.

📡 Detection & Monitoring

Log Indicators:

  • Unusual chat patterns with special characters
  • Multiple failed chat attempts with crafted prompts

Network Indicators:

  • Outbound connections to unusual domains following chat sessions
  • Large data transfers from development workstations

SIEM Query:

source="vscode_logs" AND "CodeGeeX" AND ("injection" OR "malformed" OR "exfiltrate")

🔗 References

📤 Share & Export