Copilot Command Injection

HIGH (8.4)

Threat Intelligence

Low Risk
EPSS Score: 0.06% chance of exploitation (percentile: 20%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

Copilot is a code completion and coding assistant tool used by Microsoft. This vulnerability allows an unauthorized attacker to execute code locally on your machine, potentially leading to unauthorized access or data modification.

Am I affected?

You're affected if you use Improper neutralization of special elements used. Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

How to fix

To fix this vulnerability, you can upgrade to Copilot version 1.3.0 or later from the Microsoft GitHub repository:
- git clone https://github.com/microsoft/copilot.git
- cd copilot
- git checkout main (or the desired branch)
- git merge --allow-unrelated-histories main

Alternatively, you can use the following command to update Copilot using pip:
- pip install --upgrade git+https://github.com/microsoft/copilot.git

Immediate mitigations:
- Disable code execution by setting copilot.enabled to false in your configuration file.
- Restrict access to the Copilot repository to only authorized users.

References