Skip to main content

CVE-2025-53536: CWE-552: Files or Directories Accessible to External Parties in RooCodeInc Roo-Code

High
VulnerabilityCVE-2025-53536cvecve-2025-53536cwe-552
Published: Mon Jul 07 2025 (07/07/2025, 17:57:36 UTC)
Source: CVE Database V5
Vendor/Project: RooCodeInc
Product: Roo-Code

Description

Roo Code is an AI-powered autonomous coding agent. Prior to 3.22.6, if the victim had "Write" auto-approved, an attacker with the ability to submit prompts to the agent could write to VS Code settings files and trigger code execution. There were multiple ways to achieve that. One example is with the php.validate.executablePath setting which lets you set the path for the php executable for syntax validation. The attacker could have written the path to an arbitrary command there and then created a php file to trigger it. This vulnerability is fixed in 3.22.6.

AI-Powered Analysis

AILast updated: 07/14/2025, 21:39:41 UTC

Technical Analysis

CVE-2025-53536 is a high-severity vulnerability affecting Roo-Code, an AI-powered autonomous coding agent developed by RooCodeInc. The vulnerability exists in versions prior to 3.22.6 and is classified under CWE-552, which pertains to files or directories being accessible to external parties. Specifically, if a victim user had the "Write" permission auto-approved within the agent, an attacker capable of submitting prompts to the agent could exploit this to write arbitrary data to Visual Studio Code (VS Code) settings files. This capability enables the attacker to manipulate configuration settings such as php.validate.executablePath, which defines the path to the PHP executable used for syntax validation. By altering this setting to point to an arbitrary command, the attacker could then create a PHP file that triggers execution of that command, effectively achieving remote code execution (RCE) on the victim's system. The vulnerability does not require any prior authentication or user interaction, but it does require the attacker to have the ability to submit prompts to the agent, which may be possible in environments where the agent is exposed or integrated with user inputs. The CVSS v3.1 score of 8.1 reflects the critical impact on confidentiality, integrity, and availability, with network attack vector, high attack complexity, and no privileges or user interaction required. The vulnerability was publicly disclosed on July 7, 2025, and has been fixed in version 3.22.6 of Roo-Code. No known exploits in the wild have been reported yet. This vulnerability highlights the risks of auto-approved write permissions in autonomous coding agents and the potential for configuration file manipulation leading to code execution.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those using Roo-Code in development environments integrated with VS Code. Successful exploitation could lead to full system compromise, allowing attackers to execute arbitrary code, steal sensitive intellectual property, disrupt development workflows, or deploy further malware. The ability to manipulate VS Code settings files could also undermine the integrity of the development environment, potentially injecting malicious code into software projects. Organizations in sectors with high reliance on software development, such as finance, telecommunications, automotive, and critical infrastructure, could face severe operational and reputational damage. Additionally, the breach of confidentiality and integrity could lead to regulatory non-compliance under GDPR if personal data or proprietary information is exposed or altered. The lack of known exploits in the wild suggests that proactive patching and mitigation can effectively prevent exploitation. However, the network-exploitable nature of the vulnerability means that exposed or poorly secured Roo-Code instances could be targeted by remote attackers.

Mitigation Recommendations

European organizations should immediately upgrade Roo-Code to version 3.22.6 or later to remediate this vulnerability. Beyond patching, organizations should audit and restrict the permissions granted to autonomous coding agents, avoiding auto-approval of write permissions unless absolutely necessary. Implement strict input validation and access controls on any interfaces that accept prompts or commands to the agent to prevent unauthorized submissions. Network segmentation and firewall rules should be applied to limit exposure of Roo-Code instances to trusted users and networks only. Monitoring and logging of configuration file changes and agent activities can help detect suspicious behavior early. Additionally, organizations should educate developers and DevOps teams about the risks of automated tools modifying development environment settings and encourage the use of least privilege principles. Regular security assessments of development tools and environments should be conducted to identify and mitigate similar risks proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-02T15:15:11.515Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686c0d526f40f0eb72eb6690

Added to database: 7/7/2025, 6:09:22 PM

Last enriched: 7/14/2025, 9:39:41 PM

Last updated: 8/12/2025, 5:59:40 AM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats