fkie_cve-2025-57771
Vulnerability from fkie_nvd
Published
2025-08-22 17:15
Modified
2025-08-22 18:08
Severity ?
Summary
Roo Code is an AI-powered autonomous coding agent that lives in users' editors. In versions prior to 3.25.5, Roo-Code fails to properly handle process substitution and single ampersand characters in the command parsing logic for auto-execute commands. If a user has enabled auto-approved execution for a command such as ls, an attacker who can submit crafted prompts to the agent may inject arbitrary commands to be executed alongside the intended command. Exploitation requires attacker access to submit prompts and for the user to have enabled auto-approved command execution, which is disabled by default. This vulnerability could allow an attacker to execute arbitrary code. The issue is fixed in version 3.25.5.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "Roo Code is an AI-powered autonomous coding agent that lives in users\u0027 editors. In versions prior to 3.25.5, Roo-Code fails to properly handle process substitution and single ampersand characters in the command parsing logic for auto-execute commands. If a user has enabled auto-approved execution for a command such as ls, an attacker who can submit crafted prompts to the agent may inject arbitrary commands to be executed alongside the intended command. Exploitation requires attacker access to submit prompts and for the user to have enabled auto-approved command execution, which is disabled by default. This vulnerability could allow an attacker to execute arbitrary code. The issue is fixed in version 3.25.5." }, { "lang": "es", "value": "Roo Code es un agente de codificaci\u00f3n aut\u00f3nomo basado en IA que reside en los editores de los usuarios. En versiones anteriores a la 3.25.5, Roo Code no gestiona correctamente la sustituci\u00f3n de procesos ni los caracteres \"\u0026amp;\" individuales en la l\u00f3gica de an\u00e1lisis de comandos para la ejecuci\u00f3n autom\u00e1tica. Si un usuario ha habilitado la ejecuci\u00f3n autom\u00e1tica para un comando como \"ls\", un atacante que pueda enviar solicitudes manipuladas al agente podr\u00eda inyectar comandos arbitrarios para que se ejecuten junto con el comando deseado. Para explotar esta vulnerabilidad, el atacante debe tener acceso para enviar solicitudes y que el usuario haya habilitado la ejecuci\u00f3n autom\u00e1tica de comandos, que est\u00e1 deshabilitada por defecto. Esta vulnerabilidad podr\u00eda permitir que un atacante ejecute c\u00f3digo arbitrario. El problema se solucion\u00f3 en la versi\u00f3n 3.25.5." } ], "id": "CVE-2025-57771", "lastModified": "2025-08-22T18:08:51.663", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2025-08-22T17:15:36.183", "references": [ { "source": "security-advisories@github.com", "url": "https://github.com/RooCodeInc/Roo-Code/commit/de359a465c67aefc67553aa2b464591b602c4bdc" }, { "source": "security-advisories@github.com", "url": "https://github.com/RooCodeInc/Roo-Code/security/advisories/GHSA-wrh9-463x-7wvv" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…