In May 2024, Microsoft announced its plan to gradually phase out VBScript, the dynamic scripting language it originally developed in 1996. Although Microsoft had already declared in 2008 that active development of the language would cease, support for its use was quietly retained.
To strengthen operating system security and progressively eliminate legacy code, Microsoft intends to fully remove VBScript support from Windows 11 by 2027. For most users, this change will pass unnoticed, but for enterprise environments it may introduce compatibility challenges. Many organizations still rely on VBA macros that incorporate VBScript, meaning automation solutions built on these dependencies will cease to function once VBScript is retired.
Microsoft explains that VBA remains capable of automating tasks and extending functionality across Excel, Word, and PowerPoint. In practice, however, VBScript is often invoked indirectly—through VBA applications that load external *.vbs files or reference VBScript type libraries for regular expressions. Once deprecation is complete, these integrations will no longer work.
Because of VBScript’s extensive legacy footprint, Microsoft cannot remove it in a single step. Instead, it has adopted a five-to-six-year phased retirement strategy, with the ultimate goal of eradicating all core VBScript code from future versions of Windows.
The first stage of this plan is already in effect: until 2027, VBScript will remain available as an optional feature, disabled by default but manually installable via system settings for enterprises that still depend on it.
Beyond that point, Microsoft will permanently eliminate VBScript from optional features as well, making it impossible to re-enable. From then on, any enterprise automation solutions built on VBScript will be rendered inoperable.
Related Posts:
- Evasive Phishing Campaign Delivers AsyncRAT and Infostealer
- XWorm 6.0: New Variant Uses AMSI Bypass & Critical Process Trick to Evade Detection and Crash Systems
- Obscure VBScript “sostener.vbs” Unmasked: Fuels Multi-Stage RAT Delivery, Linked to Blind Eagle APT
- Fileless Masslogger Infostealer Spreading via VBScript (.VBE) & Hiding in Your Registry