Skip to main content

CVE-2025-57771: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in RooCodeInc Roo-Code

High
VulnerabilityCVE-2025-57771cvecve-2025-57771cwe-78
Published: Fri Aug 22 2025 (08/22/2025, 16:35:47 UTC)
Source: CVE Database V5
Vendor/Project: RooCodeInc
Product: Roo-Code

Description

Roo Code is an AI-powered autonomous coding agent that lives in users' editors. In versions prior to 3.25.5, Roo-Code fails to properly handle process substitution and single ampersand characters in the command parsing logic for auto-execute commands. If a user has enabled auto-approved execution for a command such as ls, an attacker who can submit crafted prompts to the agent may inject arbitrary commands to be executed alongside the intended command. Exploitation requires attacker access to submit prompts and for the user to have enabled auto-approved command execution, which is disabled by default. This vulnerability could allow an attacker to execute arbitrary code. The issue is fixed in version 3.25.5.

AI-Powered Analysis

AILast updated: 08/22/2025, 17:02:52 UTC

Technical Analysis

CVE-2025-57771 is a high-severity OS command injection vulnerability affecting Roo-Code, an AI-powered autonomous coding agent integrated into users' code editors. The vulnerability exists in versions prior to 3.25.5 due to improper neutralization of special elements in the command parsing logic, specifically mishandling process substitution and single ampersand characters. When users enable the auto-approved execution feature for commands (which is disabled by default), an attacker who can submit crafted prompts to the agent can inject arbitrary OS commands that execute alongside intended commands such as 'ls'. This flaw stems from inadequate sanitization of input commands, classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). Exploitation requires no privileges or user interaction beyond the attacker’s ability to submit prompts and the user enabling auto-approved command execution. Successful exploitation could lead to arbitrary code execution with the privileges of the user running Roo-Code, potentially compromising confidentiality, integrity, and availability of the affected system. The vulnerability has a CVSS v3.1 base score of 8.1, indicating high severity, with network attack vector, high attack complexity, no privileges required, and no user interaction needed. The issue was addressed in version 3.25.5 of Roo-Code. No known exploits are currently reported in the wild.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for development teams or enterprises relying on Roo-Code for coding automation within their editors. Exploitation could allow attackers to execute arbitrary commands on developer machines or build servers, potentially leading to source code theft, insertion of malicious code, or disruption of development pipelines. This could result in intellectual property loss, supply chain compromise, and operational downtime. Given the nature of the vulnerability, attackers could pivot from compromised developer environments to broader enterprise networks. Confidentiality is at high risk due to potential data exfiltration, integrity is threatened by unauthorized code or configuration changes, and availability could be impacted if critical systems are disrupted. The requirement for the auto-approved command execution feature to be enabled limits the attack surface but does not eliminate risk, particularly in organizations seeking automation efficiency without fully understanding security implications.

Mitigation Recommendations

European organizations should immediately verify the Roo-Code versions deployed and upgrade all instances to version 3.25.5 or later, where the vulnerability is fixed. Until upgrades are completed, disable the auto-approved command execution feature to prevent automatic execution of potentially malicious commands. Implement strict input validation and sanitization on any user-submitted prompts or commands interacting with Roo-Code. Restrict access to Roo-Code agents to trusted users and networks to minimize the risk of attacker prompt submission. Monitor logs for unusual command executions or prompt submissions that could indicate exploitation attempts. Incorporate Roo-Code usage policies into security awareness training, emphasizing the risks of enabling auto-approved execution. Additionally, consider isolating development environments or using containerization to limit the impact of any potential compromise. Regularly audit and update third-party tools integrated into development workflows to ensure timely patching of vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-19T15:16:22.917Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a89f33ad5a09ad0020783a

Added to database: 8/22/2025, 4:47:47 PM

Last enriched: 8/22/2025, 5:02:52 PM

Last updated: 8/22/2025, 8:17:47 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats