CVE-2025-3804
📋 TL;DR
This critical vulnerability in thautwarm's vscode-diana extension allows injection attacks through the Jinja2 template handler. Attackers with local access can exploit this to execute arbitrary code or manipulate template processing. Only users of vscode-diana version 0.0.1 are affected.
💻 Affected Systems
- thautwarm vscode-diana
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Local attacker gains arbitrary code execution on the victim's system through template injection, potentially leading to full system compromise.
Likely Case
Local attacker injects malicious templates to read sensitive files, modify configurations, or execute limited commands within the extension context.
If Mitigated
With proper access controls, impact is limited to the user's own files and extension capabilities, preventing system-wide compromise.
🎯 Exploit Status
Exploit requires local access to the system. The vulnerability has been publicly disclosed with technical details available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
1. Open VS Code
2. Go to Extensions panel (Ctrl+Shift+X)
3. Search for 'vscode-diana'
4. Click Uninstall
5. Restart VS Code if prompted
🔧 Temporary Workarounds
Disable or Remove Extension
allUninstall the vulnerable vscode-diana extension from VS Code
code --uninstall-extension thautwarm.vscode-diana
Restrict Local Access
allImplement strict access controls to prevent unauthorized local access to systems with VS Code installed
🧯 If You Can't Patch
- Monitor for unusual VS Code extension activity or template processing
- Implement application allowlisting to prevent execution of malicious payloads
🔍 How to Verify
Check if Vulnerable:
Check if vscode-diana extension version 0.0.1 is installed in VS Code extensions panel
Check Version:
code --list-extensions --show-versions | grep vscode-diana
Verify Fix Applied:
Confirm vscode-diana extension is no longer listed in installed extensions
📡 Detection & Monitoring
Log Indicators:
- Unusual template processing in VS Code logs
- Suspicious file access from VS Code process
Network Indicators:
- None - this is a local vulnerability
SIEM Query:
process_name:"Code.exe" AND (event_description:"template injection" OR file_access:"Gen.py")