Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65946: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in RooCodeInc Roo-Code

0
High
VulnerabilityCVE-2025-65946cvecve-2025-65946cwe-77cwe-20
Published: Fri Nov 21 2025 (11/21/2025, 22:11:12 UTC)
Source: CVE Database V5
Vendor/Project: RooCodeInc
Product: Roo-Code

Description

Roo Code is an AI-powered autonomous coding agent that lives in users' editors. Prior to version 3.26.7, Due to an error in validation it was possible for Roo to automatically execute commands that did not match the allow list prefixes. This issue has been patched in version 3.26.7.

AI-Powered Analysis

AILast updated: 11/21/2025, 22:46:34 UTC

Technical Analysis

CVE-2025-65946 is a command injection vulnerability classified under CWE-77 and CWE-20 affecting RooCodeInc's Roo-Code, an AI-powered autonomous coding agent integrated into users' code editors. The vulnerability exists in versions prior to 3.26.7 due to improper neutralization of special elements in command inputs, allowing the AI agent to execute arbitrary system commands that do not conform to the predefined allow list prefixes. This flaw stems from an error in input validation logic, which fails to restrict command execution strictly to safe, allowed commands. Exploitation requires no authentication or user interaction and can be triggered remotely if the attacker can influence the commands processed by Roo-Code. The vulnerability impacts confidentiality by potentially exposing sensitive data, integrity by allowing unauthorized command execution altering system or codebase state, and availability by enabling disruptive commands. The CVSS v3.1 score of 8.1 reflects high severity, with network attack vector, high impact on confidentiality, integrity, and availability, and no privileges or user interaction required. Although no known exploits are currently reported in the wild, the risk remains significant given the nature of the vulnerability and the widespread use of Roo-Code among developers. The issue was publicly disclosed on November 21, 2025, and patched in version 3.26.7, which corrects the validation logic to enforce strict command allow-listing. Organizations using vulnerable versions should urgently upgrade and implement additional controls to mitigate risk.

Potential Impact

For European organizations, the impact of CVE-2025-65946 can be severe. Roo-Code is integrated into developers' editors, meaning that exploitation could lead to unauthorized execution of arbitrary commands on developer machines or build environments. This can result in theft or leakage of sensitive intellectual property, insertion of malicious code into software projects, disruption of development workflows, and potential lateral movement within corporate networks. Given the high reliance on software development and digital transformation initiatives in Europe, such a vulnerability could undermine software supply chain integrity and operational continuity. Furthermore, organizations in regulated industries (e.g., finance, healthcare, critical infrastructure) face increased compliance risks if exploited. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation if vulnerable versions are in use. Although no exploits are known in the wild yet, the potential for targeted attacks or automated scanning is high, especially as threat actors often weaponize such vulnerabilities rapidly after disclosure.

Mitigation Recommendations

1. Immediate upgrade to Roo-Code version 3.26.7 or later to apply the official patch that fixes the command validation flaw. 2. Implement strict network segmentation and firewall rules to limit Roo-Code's network access, reducing exposure to remote exploitation. 3. Monitor developer environments and CI/CD pipelines for unusual command execution patterns or unexpected process launches indicative of exploitation attempts. 4. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and block unauthorized command executions. 5. Educate developers and IT staff about the vulnerability and encourage vigilance regarding suspicious behavior in development tools. 6. Review and harden configurations of Roo-Code integrations, disabling any unnecessary remote command execution features. 7. Conduct internal audits to identify all instances of Roo-Code deployment and verify patch levels. 8. Consider implementing runtime application self-protection (RASP) or sandboxing techniques to contain potential exploitation impacts. These measures go beyond generic patching by focusing on detection, containment, and reducing attack surface in development environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-18T16:14:56.691Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6920e83b27835fd566e79355

Added to database: 11/21/2025, 10:31:23 PM

Last enriched: 11/21/2025, 10:46:34 PM

Last updated: 11/22/2025, 12:51:42 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats