CVE-2026-30314
W module auto-zatwierdzania Ridvay Code występuje krytyczna podatność na wstrzyknięcie poleceń, co umożliwia zdalne wykonanie kodu.
Ridvay Code's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective. The system relies on fragile regular expressions to parse command structures; while it attempts to intercept dangerous operations, it fails to account for standard Shell command substitution Ridvay Code (specifically$(...)and backticks ...). An attacker can construct a command such as git log --grep="$(malicious_command)", forcing Syntx to misidentify it as a safe git operation and automatically approve it. The underlying Shell prioritizes the execution of the malicious code injected within the arguments, resulting in Remote Code Execution without any user interaction.
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.5% |
| Opublikowano (NVD) | 2026-03-31 15:16:13 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-03 15:57:23 UTC |
- https://github.com/Secsys-FDU/LLM-Tool-Calling-CVEs/issues/8 (cve@mitre.org) [Third Party Advisory]
- https://ridvay.com/ (cve@mitre.org) [Product]