CVE-2026-30307
W module auto-zatwierdzania Roo Code występuje krytyczna luka umożliwiająca zdalne wykonanie kodu.
Roo Code's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective. The system relies on fragile regular expressions to parse command structures; while it attempts to intercept dangerous operations, it fails to account for standard Shell command substitution Roo Code (specifically$(...)and backticks ...). An attacker can construct a command such as git log --grep="$(malicious_command)", forcing Syntx to misidentify it as a safe git operation and automatically approve it. The underlying Shell prioritizes the execution of the malicious code injected within the arguments, resulting in Remote Code Execution without any user interaction.
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.7% |
| Opublikowano (NVD) | 2026-03-30 20:16:21 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-06 15:57:26 UTC |
- https://github.com/Secsys-FDU/LLM-Tool-Calling-CVEs/issues/7 (cve@mitre.org) [Third Party Advisory]
- https://roocode.com/ (cve@mitre.org) [Product]