Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11445: Injection in Kilo Code

0
Medium
VulnerabilityCVE-2025-11445cvecve-2025-11445
Published: Wed Oct 08 2025 (10/08/2025, 08:32:07 UTC)
Source: CVE Database V5
Product: Kilo Code

Description

A vulnerability was detected in Kilo Code up to 4.86.0. Affected is the function ClineProvider of the file src/core/webview/ClineProvider.ts of the component Prompt Handler. Performing manipulation results in injection. The attack can be initiated remotely. The exploit is now public and may be used. Applying a patch is the recommended action to fix this issue.

AI-Powered Analysis

AILast updated: 10/08/2025, 08:50:38 UTC

Technical Analysis

CVE-2025-11445 identifies a remote injection vulnerability in the Kilo Code software, specifically in the ClineProvider function of the Prompt Handler component located in src/core/webview/ClineProvider.ts. This vulnerability affects all versions up to and including 4.86.0. The injection flaw allows an attacker to manipulate input data remotely, leading to injection attacks that can compromise the application's behavior. The vulnerability requires no authentication or privileges but does require user interaction, such as triggering a crafted prompt or input. The CVSS 4.0 base score of 5.3 reflects a medium severity, considering the attack vector is network-based with low complexity and no privileges required, but with limited impact on confidentiality, integrity, and availability. The vulnerability does not require scope change or user authentication, but user interaction is necessary. No known exploits are currently active in the wild, but exploit code has been publicly disclosed, increasing the risk of exploitation. The vulnerability primarily threatens web applications built on Kilo Code, potentially allowing attackers to inject malicious code or commands, leading to data manipulation, unauthorized actions, or partial service disruption. The lack of patch links suggests that organizations should monitor vendor advisories closely for updates. The vulnerability's technical details indicate it is a classic injection issue, likely stemming from insufficient input sanitization or validation in the affected function. Given the widespread affected versions, many deployments could be vulnerable if not updated.

Potential Impact

For European organizations, this vulnerability poses a moderate risk, especially for those relying on Kilo Code in web-facing applications or internal tools. Injection vulnerabilities can lead to unauthorized data manipulation, partial service disruption, or unauthorized command execution, impacting confidentiality, integrity, and availability to some extent. The requirement for user interaction limits automated exploitation but does not eliminate risk, as phishing or social engineering could facilitate attacks. Organizations in sectors with high reliance on web applications, such as finance, healthcare, and government, may face increased exposure. The public availability of exploit code raises the likelihood of opportunistic attacks, potentially leading to data breaches or operational interruptions. Additionally, regulatory frameworks like GDPR impose strict data protection requirements, so exploitation causing data leakage could result in significant compliance penalties. The medium severity suggests that while the threat is not critical, it should be addressed promptly to avoid escalation or chaining with other vulnerabilities.

Mitigation Recommendations

1. Apply official patches from the Kilo Code vendor as soon as they become available to remediate the injection vulnerability. 2. Until patches are deployed, implement strict input validation and sanitization on all user inputs processed by the ClineProvider function or related components to prevent injection payloads. 3. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block injection attempts targeting the affected endpoints. 4. Conduct security awareness training to reduce the risk of successful social engineering or phishing that could trigger user interaction required for exploitation. 5. Monitor application logs and network traffic for unusual or suspicious input patterns indicative of injection attempts. 6. Employ runtime application self-protection (RASP) tools if available to detect and block injection attacks in real time. 7. Review and restrict user privileges and access controls to minimize potential damage if exploitation occurs. 8. Maintain an incident response plan tailored to injection attacks to enable rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-07T13:30:21.029Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e625ceda3febf7f3bdd31b

Added to database: 10/8/2025, 8:50:22 AM

Last enriched: 10/8/2025, 8:50:38 AM

Last updated: 10/9/2025, 11:01:24 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats