Roo Code is an AI-powered autonomous coding agent that lives in users' editors. In versions 3.23.18 and below, RooCode does not validate line breaks (\n) in its command input, allowing potential bypass of the allow-list mechanism. The project appears to lack parsing or validation logic to prevent multi-line command injection. When commands are evaluated for execution, only the first line or token may be considered, enabling attackers to smuggle additional commands in subsequent lines. This is fixed in version 3.23.19.
References
Link | Resource |
---|---|
https://github.com/RooCodeInc/Roo-Code/commit/9d434c2db9b20eb5c78b698cb2b0037cd2074534 | Patch |
https://github.com/RooCodeInc/Roo-Code/security/advisories/GHSA-p278-52x9-cffx | Exploit Vendor Advisory |
https://github.com/RooCodeInc/Roo-Code/security/advisories/GHSA-p278-52x9-cffx | Exploit Vendor Advisory |
Configurations
History
11 Sep 2025, 15:56
Type | Values Removed | Values Added |
---|---|---|
First Time |
Roocode roo Code
Roocode |
|
CPE | cpe:2.3:a:roocode:roo_code:*:*:*:*:*:*:*:* | |
Summary |
|
|
References | () https://github.com/RooCodeInc/Roo-Code/commit/9d434c2db9b20eb5c78b698cb2b0037cd2074534 - Patch | |
References | () https://github.com/RooCodeInc/Roo-Code/security/advisories/GHSA-p278-52x9-cffx - Exploit, Vendor Advisory |
23 Jul 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-23 21:15
Updated : 2025-09-11 15:56
NVD link : CVE-2025-54377
Mitre link : CVE-2025-54377
CVE.ORG link : CVE-2025-54377
JSON object : View
Products Affected
roocode
- roo_code
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')