Roo Code is an AI-powered autonomous coding agent that lives in users' editors. In versions 3.23.18 and below, RooCode does not validate line breaks (\n) in its command input, allowing potential bypass of the allow-list mechanism. The project appears to lack parsing or validation logic to prevent multi-line command injection. When commands are evaluated for execution, only the first line or token may be considered, enabling attackers to smuggle additional commands in subsequent lines. This is fixed in version 3.23.19.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2025-22473 | Roo Code is an AI-powered autonomous coding agent that lives in users' editors. In versions 3.23.18 and below, RooCode does not validate line breaks (\n) in its command input, allowing potential bypass of the allow-list mechanism. The project appears to lack parsing or validation logic to prevent multi-line command injection. When commands are evaluated for execution, only the first line or token may be considered, enabling attackers to smuggle additional commands in subsequent lines. This is fixed in version 3.23.19. | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    Thu, 11 Sep 2025 16:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Roocode
         Roocode roo Code  | 
|
| CPEs | cpe:2.3:a:roocode:roo_code:*:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Roocode
         Roocode roo Code  | 
Wed, 23 Jul 2025 21:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Wed, 23 Jul 2025 20:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Roo Code is an AI-powered autonomous coding agent that lives in users' editors. In versions 3.23.18 and below, RooCode does not validate line breaks (\n) in its command input, allowing potential bypass of the allow-list mechanism. The project appears to lack parsing or validation logic to prevent multi-line command injection. When commands are evaluated for execution, only the first line or token may be considered, enabling attackers to smuggle additional commands in subsequent lines. This is fixed in version 3.23.19. | |
| Title | Roo Code Lacks Line Break Validation in its Command Execution Tool | |
| Weaknesses | CWE-77 | |
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-07-23T20:48:31.557Z
Reserved: 2025-07-21T16:12:20.733Z
Link: CVE-2025-54377
Updated: 2025-07-23T20:48:28.607Z
Status : Analyzed
Published: 2025-07-23T21:15:27.060
Modified: 2025-09-11T15:56:35.037
Link: CVE-2025-54377
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD