CVE-2025-53536: CWE-552: Files or Directories Accessible to External Parties in RooCodeInc Roo-Code
Roo Code is an AI-powered autonomous coding agent. Prior to 3.22.6, if the victim had "Write" auto-approved, an attacker with the ability to submit prompts to the agent could write to VS Code settings files and trigger code execution. There were multiple ways to achieve that. One example is with the php.validate.executablePath setting which lets you set the path for the php executable for syntax validation. The attacker could have written the path to an arbitrary command there and then created a php file to trigger it. This vulnerability is fixed in 3.22.6.
AI Analysis
Technical Summary
CVE-2025-53536 is a high-severity vulnerability affecting Roo-Code, an AI-powered autonomous coding agent developed by RooCodeInc. The vulnerability exists in versions prior to 3.22.6 and is categorized under CWE-552, which involves files or directories being accessible to external parties. Specifically, if a victim user has the "Write" permission auto-approved for the agent, an attacker capable of submitting prompts to the agent can exploit this to write to Visual Studio Code (VS Code) settings files. This manipulation allows the attacker to trigger arbitrary code execution on the victim's system. One documented exploitation method involves modifying the php.validate.executablePath setting, which normally specifies the path to the PHP executable used for syntax validation. By changing this setting to point to an arbitrary command, and then creating a PHP file to trigger it, the attacker can execute malicious code. The vulnerability does not require prior authentication or user interaction, but does require the victim to have auto-approved write permissions for the agent. The vulnerability has a CVSS 3.1 score of 8.1, reflecting high impact on confidentiality, integrity, and availability, with network attack vector and high attack complexity. No known exploits are currently reported in the wild. The issue was addressed and fixed in version 3.22.6 of Roo-Code.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for development teams and environments using Roo-Code integrated with VS Code. Successful exploitation can lead to full compromise of the developer's workstation, allowing attackers to execute arbitrary code, potentially leading to theft of sensitive intellectual property, insertion of malicious code into software projects, or lateral movement within corporate networks. Given the autonomous nature of Roo-Code and its integration with developer tools, exploitation could undermine software supply chain integrity. Confidentiality, integrity, and availability of development environments and source code repositories are at risk. Organizations relying on Roo-Code for automation in software development could face operational disruptions and reputational damage if exploited. The lack of required authentication and user interaction increases the risk of automated or remote exploitation, particularly in environments where prompt submissions are exposed or insufficiently controlled.
Mitigation Recommendations
European organizations should immediately verify the version of Roo-Code in use and upgrade to version 3.22.6 or later, where the vulnerability is patched. Until upgrade is possible, organizations should disable or restrict the "Write" auto-approval feature for the agent to prevent unauthorized modifications to VS Code settings files. Implement strict access controls and input validation on any interfaces that accept prompts to the agent, ensuring only trusted users can submit commands. Monitor developer environments for unusual changes to VS Code settings files, especially php.validate.executablePath or similar configuration parameters. Employ endpoint detection and response (EDR) solutions to detect anomalous process executions originating from developer tools. Conduct security awareness training for developers about the risks of automated coding agents and the importance of permission management. Finally, consider network segmentation to isolate development environments from critical production systems to limit potential lateral movement.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland
CVE-2025-53536: CWE-552: Files or Directories Accessible to External Parties in RooCodeInc Roo-Code
Description
Roo Code is an AI-powered autonomous coding agent. Prior to 3.22.6, if the victim had "Write" auto-approved, an attacker with the ability to submit prompts to the agent could write to VS Code settings files and trigger code execution. There were multiple ways to achieve that. One example is with the php.validate.executablePath setting which lets you set the path for the php executable for syntax validation. The attacker could have written the path to an arbitrary command there and then created a php file to trigger it. This vulnerability is fixed in 3.22.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-53536 is a high-severity vulnerability affecting Roo-Code, an AI-powered autonomous coding agent developed by RooCodeInc. The vulnerability exists in versions prior to 3.22.6 and is categorized under CWE-552, which involves files or directories being accessible to external parties. Specifically, if a victim user has the "Write" permission auto-approved for the agent, an attacker capable of submitting prompts to the agent can exploit this to write to Visual Studio Code (VS Code) settings files. This manipulation allows the attacker to trigger arbitrary code execution on the victim's system. One documented exploitation method involves modifying the php.validate.executablePath setting, which normally specifies the path to the PHP executable used for syntax validation. By changing this setting to point to an arbitrary command, and then creating a PHP file to trigger it, the attacker can execute malicious code. The vulnerability does not require prior authentication or user interaction, but does require the victim to have auto-approved write permissions for the agent. The vulnerability has a CVSS 3.1 score of 8.1, reflecting high impact on confidentiality, integrity, and availability, with network attack vector and high attack complexity. No known exploits are currently reported in the wild. The issue was addressed and fixed in version 3.22.6 of Roo-Code.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for development teams and environments using Roo-Code integrated with VS Code. Successful exploitation can lead to full compromise of the developer's workstation, allowing attackers to execute arbitrary code, potentially leading to theft of sensitive intellectual property, insertion of malicious code into software projects, or lateral movement within corporate networks. Given the autonomous nature of Roo-Code and its integration with developer tools, exploitation could undermine software supply chain integrity. Confidentiality, integrity, and availability of development environments and source code repositories are at risk. Organizations relying on Roo-Code for automation in software development could face operational disruptions and reputational damage if exploited. The lack of required authentication and user interaction increases the risk of automated or remote exploitation, particularly in environments where prompt submissions are exposed or insufficiently controlled.
Mitigation Recommendations
European organizations should immediately verify the version of Roo-Code in use and upgrade to version 3.22.6 or later, where the vulnerability is patched. Until upgrade is possible, organizations should disable or restrict the "Write" auto-approval feature for the agent to prevent unauthorized modifications to VS Code settings files. Implement strict access controls and input validation on any interfaces that accept prompts to the agent, ensuring only trusted users can submit commands. Monitor developer environments for unusual changes to VS Code settings files, especially php.validate.executablePath or similar configuration parameters. Employ endpoint detection and response (EDR) solutions to detect anomalous process executions originating from developer tools. Conduct security awareness training for developers about the risks of automated coding agents and the importance of permission management. Finally, consider network segmentation to isolate development environments from critical production systems to limit potential lateral movement.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-02T15:15:11.515Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686c0d526f40f0eb72eb6690
Added to database: 7/7/2025, 6:09:22 PM
Last enriched: 7/7/2025, 6:24:30 PM
Last updated: 7/7/2025, 6:24:30 PM
Views: 2
Related Threats
CVE-2025-53543: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kestra-io kestra
MediumCVE-2025-53540: CWE-352: Cross-Site Request Forgery (CSRF) in espressif arduino-esp32
HighCVE-2025-7142: Cross Site Scripting in SourceCodester Best Salon Management System
MediumCVE-2025-53539: CWE-1333: Inefficient Regular Expression Complexity in rennf93 fastapi-guard
MediumCVE-2025-53496: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Wikimedia Foundation Mediawiki - MediaSearch Extension
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.