CVE-2025-6705

5.3 MEDIUM

📋 TL;DR

A vulnerability in Eclipse Open VSX Registry's automated publishing system allowed unauthorized uploads of extensions due to insufficient isolation of build scripts. This exposed a privileged token enabling attackers to publish new extension versions under any namespace, potentially distributing malicious extensions. The vulnerability affected users of the Open VSX Registry who might install compromised extensions.

💻 Affected Systems

Products:
  • Eclipse Open VSX Registry
Versions: Versions prior to the fix implemented by June 24, 2025
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the automated publishing system's build scripts; standard publishing process was unaffected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could publish malicious extensions under legitimate namespaces, leading to supply chain attacks where users unknowingly install compromised software with potential backdoors or malware.

🟠

Likely Case

Unauthorized publishing of extensions, potentially including malicious code, though limited to new versions (cannot overwrite existing versions or delete extensions).

🟢

If Mitigated

With proper access controls and script isolation, the vulnerability would be prevented, maintaining the integrity of the extension publishing process.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to the build script environment and knowledge of the token exposure; no evidence of actual compromise was found.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed by June 24, 2025

Vendor Advisory: https://github.com/EclipseFdn/publish-extensions/pull/881

Restart Required: No

Instructions:

1. Update to the patched version of Eclipse Open VSX Registry. 2. Ensure build scripts are properly isolated. 3. Rotate any exposed tokens. 4. Conduct security audit as recommended.

🔧 Temporary Workarounds

Disable automated publishing

all

Temporarily disable the vulnerable automated publishing system until patched.

# Configuration-dependent; consult system documentation

Implement script isolation

all

Manually enforce isolation for build scripts to prevent token exposure.

# Use containerization or sandboxing for build environments

🧯 If You Can't Patch

  • Monitor for unauthorized extension uploads and review all new extensions manually.
  • Implement strict access controls and audit logging for the publishing system.

🔍 How to Verify

Check if Vulnerable:

Check if using a version of Eclipse Open VSX Registry prior to the June 24, 2025 fix; review build script isolation and token handling.

Check Version:

# Check registry version via administrative interface or configuration files

Verify Fix Applied:

Confirm update to post-June 24, 2025 version and verify build scripts are properly isolated with secure token management.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized extension uploads
  • Unusual publishing activity from unexpected sources
  • Failed isolation attempts in build logs

Network Indicators:

  • Unexpected connections to publishing endpoints
  • Anomalous traffic patterns during build processes

SIEM Query:

source="open-vsx" AND (event="extension_publish" AND user NOT IN allowed_users) OR (event="build_script_execution" AND isolation_failure=true)

🔗 References

📤 Share & Export