Skip to main content

CVE-2025-53536: CWE-552: Files or Directories Accessible to External Parties in RooCodeInc Roo-Code

High
VulnerabilityCVE-2025-53536cvecve-2025-53536cwe-552
Published: Mon Jul 07 2025 (07/07/2025, 17:57:36 UTC)
Source: CVE Database V5
Vendor/Project: RooCodeInc
Product: Roo-Code

Description

Roo Code is an AI-powered autonomous coding agent. Prior to 3.22.6, if the victim had "Write" auto-approved, an attacker with the ability to submit prompts to the agent could write to VS Code settings files and trigger code execution. There were multiple ways to achieve that. One example is with the php.validate.executablePath setting which lets you set the path for the php executable for syntax validation. The attacker could have written the path to an arbitrary command there and then created a php file to trigger it. This vulnerability is fixed in 3.22.6.

AI-Powered Analysis

AILast updated: 07/07/2025, 18:24:30 UTC

Technical Analysis

CVE-2025-53536 is a high-severity vulnerability affecting Roo-Code, an AI-powered autonomous coding agent developed by RooCodeInc. The vulnerability exists in versions prior to 3.22.6 and is categorized under CWE-552, which involves files or directories being accessible to external parties. Specifically, if a victim user has the "Write" permission auto-approved for the agent, an attacker capable of submitting prompts to the agent can exploit this to write to Visual Studio Code (VS Code) settings files. This manipulation allows the attacker to trigger arbitrary code execution on the victim's system. One documented exploitation method involves modifying the php.validate.executablePath setting, which normally specifies the path to the PHP executable used for syntax validation. By changing this setting to point to an arbitrary command, and then creating a PHP file to trigger it, the attacker can execute malicious code. The vulnerability does not require prior authentication or user interaction, but does require the victim to have auto-approved write permissions for the agent. The vulnerability has a CVSS 3.1 score of 8.1, reflecting high impact on confidentiality, integrity, and availability, with network attack vector and high attack complexity. No known exploits are currently reported in the wild. The issue was addressed and fixed in version 3.22.6 of Roo-Code.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for development teams and environments using Roo-Code integrated with VS Code. Successful exploitation can lead to full compromise of the developer's workstation, allowing attackers to execute arbitrary code, potentially leading to theft of sensitive intellectual property, insertion of malicious code into software projects, or lateral movement within corporate networks. Given the autonomous nature of Roo-Code and its integration with developer tools, exploitation could undermine software supply chain integrity. Confidentiality, integrity, and availability of development environments and source code repositories are at risk. Organizations relying on Roo-Code for automation in software development could face operational disruptions and reputational damage if exploited. The lack of required authentication and user interaction increases the risk of automated or remote exploitation, particularly in environments where prompt submissions are exposed or insufficiently controlled.

Mitigation Recommendations

European organizations should immediately verify the version of Roo-Code in use and upgrade to version 3.22.6 or later, where the vulnerability is patched. Until upgrade is possible, organizations should disable or restrict the "Write" auto-approval feature for the agent to prevent unauthorized modifications to VS Code settings files. Implement strict access controls and input validation on any interfaces that accept prompts to the agent, ensuring only trusted users can submit commands. Monitor developer environments for unusual changes to VS Code settings files, especially php.validate.executablePath or similar configuration parameters. Employ endpoint detection and response (EDR) solutions to detect anomalous process executions originating from developer tools. Conduct security awareness training for developers about the risks of automated coding agents and the importance of permission management. Finally, consider network segmentation to isolate development environments from critical production systems to limit potential lateral movement.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-02T15:15:11.515Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686c0d526f40f0eb72eb6690

Added to database: 7/7/2025, 6:09:22 PM

Last enriched: 7/7/2025, 6:24:30 PM

Last updated: 7/7/2025, 6:24:30 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats