.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
Description
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
.NET WPF XPS document parsing vulnerability allows remote code execution via specially crafted XPS files.
Vulnerability
CVE-2023-24895 is a remote code execution vulnerability in .NET, .NET Framework, and Visual Studio, specifically in the Windows Presentation Foundation (WPF) framework's handling of XPS documents [1][2]. The root cause lies in how WPF applications load and render XPS documents, which can be exploited to execute arbitrary code on a target system [2][3].
Exploitation
No authentication is required to trigger the vulnerability; an attacker would need to convince a user to open a specially crafted XPS document [2]. This can be achieved via a malicious email attachment or a compromised website hosting the exploit file [1][2]. The attack surface is limited to Windows desktop applications built with WPF running .NET 6.0 (≤6.0.16) or .NET 7.0 (≤7.0.5) [2][3].
Impact
Successful exploitation grants the attacker the ability to execute arbitrary code in the context of the current user, potentially leading to full system compromise, data theft, installation of malware, or other malicious activities [1][2]. Microsoft notes no mitigating factors exist for this vulnerability, making it a high-severity issue for affected applications [2][3].
Mitigation
Microsoft has released patches for .NET 6.0 (6.0.18) and .NET 7.0 (7.0.7) via updated runtime packages [2][3]. Developers and users should update their .NET installations to the latest versions, which can be done through Visual Studio update prompts or by running 'dotnet --info' to check and manually apply updates [2][3]. WPF is a .NET Core UI framework for building Windows desktop applications, so any application using the affected 'Microsoft.WindowsDesktop.App.Runtime' packages is vulnerable and must be updated [2][4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Microsoft.WindowsDesktop.App.Runtime.win-arm64NuGet | >= 7.0.0, < 7.0.7 | 7.0.7 |
Microsoft.WindowsDesktop.App.Runtime.win-x64NuGet | >= 7.0.0, < 7.0.7 | 7.0.7 |
Microsoft.WindowsDesktop.App.Runtime.win-x86NuGet | >= 7.0.0, < 7.0.7 | 7.0.7 |
Microsoft.WindowsDesktop.App.Runtime.win-arm64NuGet | >= 6.0.0, < 6.0.18 | 6.0.18 |
Microsoft.WindowsDesktop.App.Runtime.win-x64NuGet | >= 6.0.0, < 6.0.18 | 6.0.18 |
Microsoft.WindowsDesktop.App.Runtime.win-x86NuGet | >= 6.0.0, < 6.0.18 | 6.0.18 |
Affected products
24- osv-coords5 versionspkg:bitnami/dotnetpkg:bitnami/dotnet-sdkpkg:nuget/microsoft.windowsdesktop.app.runtime.win-arm64pkg:nuget/microsoft.windowsdesktop.app.runtime.win-x64pkg:nuget/microsoft.windowsdesktop.app.runtime.win-x86
>= 6.0.0, < 6.0.1+ 4 more
- (no CPE)range: >= 6.0.0, < 6.0.1
- (no CPE)range: >= 6.0.0, < 6.0.1
- (no CPE)range: >= 7.0.0, < 7.0.7
- (no CPE)range: >= 7.0.0, < 7.0.7
- (no CPE)range: >= 7.0.0, < 7.0.7
- Microsoft/Microsoft .NET Framework 2.0 Service Pack 2v5Range: 2.0.0
- Microsoft/Microsoft .NET Framework 3.0 Service Pack 2v5Range: 3.0.0
- Microsoft/Microsoft .NET Framework 3.5v5Range: 3.5.0
- Microsoft/Microsoft .NET Framework 3.5.1v5Range: 3.5.0
- Microsoft/Microsoft .NET Framework 3.5 and 4.6.2v5Range: 4.7.0
- Microsoft/Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2v5Range: 3.0.0.0
- Microsoft/Microsoft .NET Framework 3.5 AND 4.7.2v5Range: 4.7.0
- Microsoft/Microsoft .NET Framework 3.5 AND 4.8v5Range: 4.8.0
- Microsoft/Microsoft .NET Framework 3.5 AND 4.8.1v5Range: 4.8.1
- Microsoft/Microsoft .NET Framework 4.6.2v5Range: 4.7.0
- Microsoft/Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2v5Range: 4.7.0
- Microsoft/Microsoft .NET Framework 4.8v5Range: 4.8.0
- Microsoft/Microsoft Visual Studio 2022 version 17.0v5Range: 17.0.0
- Microsoft/Microsoft Visual Studio 2022 version 17.2v5Range: 17.2.0
- Microsoft/Microsoft Visual Studio 2022 version 17.4v5Range: 17.4.0
- Microsoft/Microsoft Visual Studio 2022 version 17.6v5Range: 17.6.0
- Microsoft/.NET 7.0v5Range: 7.0.0
- Microsoft/PowerShell 7.2v5Range: 7.2.0
- Microsoft/PowerShell 7.3v5Range: 7.3.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-jh2h-qcrw-ghg7ghsaADVISORY
- msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24895ghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2023-24895ghsaADVISORY
- github.com/dotnet/announcements/issues/261ghsaWEB
- github.com/dotnet/wpf/security/advisories/GHSA-jh2h-qcrw-ghg7ghsaWEB
News mentions
0No linked articles in our index yet.