CVE-2025-3804

5.3 MEDIUM

📋 TL;DR

This critical vulnerability in thautwarm's vscode-diana extension allows injection attacks through the Jinja2 template handler. Attackers with local access can exploit this to execute arbitrary code or manipulate template processing. Only users of vscode-diana version 0.0.1 are affected.

💻 Affected Systems

Products:
  • thautwarm vscode-diana
Versions: 0.0.1
Operating Systems: All platforms running VS Code
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects users who have installed this specific VS Code extension. The vulnerability is in the Gen.py file's Jinja2 template handling component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains arbitrary code execution on the victim's system through template injection, potentially leading to full system compromise.

🟠

Likely Case

Local attacker injects malicious templates to read sensitive files, modify configurations, or execute limited commands within the extension context.

🟢

If Mitigated

With proper access controls, impact is limited to the user's own files and extension capabilities, preventing system-wide compromise.

🌐 Internet-Facing: LOW - Exploitation requires local access to the system running the vulnerable extension.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this, but requires specific conditions and the vulnerable extension to be installed.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access to the system. The vulnerability has been publicly disclosed with technical details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Open VS Code
2. Go to Extensions panel (Ctrl+Shift+X)
3. Search for 'vscode-diana'
4. Click Uninstall
5. Restart VS Code if prompted

🔧 Temporary Workarounds

Disable or Remove Extension

all

Uninstall the vulnerable vscode-diana extension from VS Code

code --uninstall-extension thautwarm.vscode-diana

Restrict Local Access

all

Implement strict access controls to prevent unauthorized local access to systems with VS Code installed

🧯 If You Can't Patch

  • Monitor for unusual VS Code extension activity or template processing
  • Implement application allowlisting to prevent execution of malicious payloads

🔍 How to Verify

Check if Vulnerable:

Check if vscode-diana extension version 0.0.1 is installed in VS Code extensions panel

Check Version:

code --list-extensions --show-versions | grep vscode-diana

Verify Fix Applied:

Confirm vscode-diana extension is no longer listed in installed extensions

📡 Detection & Monitoring

Log Indicators:

  • Unusual template processing in VS Code logs
  • Suspicious file access from VS Code process

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

process_name:"Code.exe" AND (event_description:"template injection" OR file_access:"Gen.py")

🔗 References

📤 Share & Export