Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-fmw8-87vg-57bj
Vulnerability ID VCID-fmw8-87vg-57bj
Aliases CVE-2023-35390
GHSA-p8rx-fwgq-rh2f
Summary Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') .NET and Visual Studio Remote Code Execution Vulnerability
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 7.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35390.json
epss 0.02009 https://api.first.org/data/v1/epss?cve=CVE-2023-35390
epss 0.02009 https://api.first.org/data/v1/epss?cve=CVE-2023-35390
epss 0.02009 https://api.first.org/data/v1/epss?cve=CVE-2023-35390
epss 0.02009 https://api.first.org/data/v1/epss?cve=CVE-2023-35390
epss 0.02009 https://api.first.org/data/v1/epss?cve=CVE-2023-35390
epss 0.02009 https://api.first.org/data/v1/epss?cve=CVE-2023-35390
epss 0.02009 https://api.first.org/data/v1/epss?cve=CVE-2023-35390
epss 0.02009 https://api.first.org/data/v1/epss?cve=CVE-2023-35390
epss 0.02009 https://api.first.org/data/v1/epss?cve=CVE-2023-35390
epss 0.02009 https://api.first.org/data/v1/epss?cve=CVE-2023-35390
epss 0.02009 https://api.first.org/data/v1/epss?cve=CVE-2023-35390
epss 0.02009 https://api.first.org/data/v1/epss?cve=CVE-2023-35390
epss 0.02009 https://api.first.org/data/v1/epss?cve=CVE-2023-35390
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-p8rx-fwgq-rh2f
cvssv3.1 7.8 https://github.com/dotnet/announcements/issues/266
generic_textual HIGH https://github.com/dotnet/announcements/issues/266
cvssv3.1 7.8 https://github.com/dotnet/sdk
generic_textual HIGH https://github.com/dotnet/sdk
cvssv3.1 7.8 https://github.com/dotnet/sdk/security/advisories/GHSA-p8rx-fwgq-rh2f
cvssv3.1_qr HIGH https://github.com/dotnet/sdk/security/advisories/GHSA-p8rx-fwgq-rh2f
generic_textual HIGH https://github.com/dotnet/sdk/security/advisories/GHSA-p8rx-fwgq-rh2f
cvssv3.1 7.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V
cvssv3.1 7.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/
cvssv3.1 7.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY
cvssv3.1 7.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/
cvssv3.1 7.8 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390
cvssv3.1 7.8 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390
generic_textual HIGH https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390
ssvc Track https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390
cvssv3.1 7.8 https://nvd.nist.gov/vuln/detail/CVE-2023-35390
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2023-35390
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35390.json
https://api.first.org/data/v1/epss?cve=CVE-2023-35390
https://github.com/dotnet/announcements/issues/266
https://github.com/dotnet/sdk
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY
2228622 https://bugzilla.redhat.com/show_bug.cgi?id=2228622
CL2L4WE5QRT7WEXANYXSKSU43APC5N2V https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/
cpe:2.3:a:microsoft:.net:6.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio:2022:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio:2022:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2022:17.4:*:*:*:*:*:*:*
CVE-2023-35390 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390
CVE-2023-35390 https://nvd.nist.gov/vuln/detail/CVE-2023-35390
GHSA-p8rx-fwgq-rh2f https://github.com/advisories/GHSA-p8rx-fwgq-rh2f
GHSA-p8rx-fwgq-rh2f https://github.com/dotnet/sdk/security/advisories/GHSA-p8rx-fwgq-rh2f
NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/
RHSA-2023:4639 https://access.redhat.com/errata/RHSA-2023:4639
RHSA-2023:4640 https://access.redhat.com/errata/RHSA-2023:4640
RHSA-2023:4641 https://access.redhat.com/errata/RHSA-2023:4641
RHSA-2023:4642 https://access.redhat.com/errata/RHSA-2023:4642
RHSA-2023:4643 https://access.redhat.com/errata/RHSA-2023:4643
RHSA-2023:4644 https://access.redhat.com/errata/RHSA-2023:4644
RHSA-2023:4645 https://access.redhat.com/errata/RHSA-2023:4645
USN-6278-1 https://usn.ubuntu.com/6278-1/
USN-6278-2 https://usn.ubuntu.com/6278-2/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35390.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/dotnet/announcements/issues/266
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/dotnet/sdk
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/dotnet/sdk/security/advisories/GHSA-p8rx-fwgq-rh2f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-04T01:21:48Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-04T01:21:48Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C Found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-04T01:21:48Z/ Found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-35390
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.83642
EPSS Score 0.02009
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:51:41.030810+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/Microsoft.NET.Build.Containers/CVE-2023-35390.yml 38.0.0