A path traversal vulnerability in all versions of the Qodo Qodo Gen IDE enables a threat actor to read arbitrary local files in and outside of current projects on an end user’s system. The vulnerability can be reached directly and through indirect prompt injection.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 17 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Oct 2025 15:45:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability in all versions of the Qodo Qodo Gen IDE enables a threat actor to read arbitrary local files in and outside of current projects on an end user’s system. The vulnerability can be reached directly and through indirect prompt injection.
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: HiddenLayer

Published:

Updated: 2025-10-17T15:48:52.236Z

Reserved: 2025-10-10T13:18:25.508Z

Link: CVE-2025-62356

cve-icon Vulnrichment

Updated: 2025-10-17T15:48:17.026Z

cve-icon NVD

Status : Received

Published: 2025-10-17T16:15:39.283

Modified: 2025-10-17T16:15:39.283

Link: CVE-2025-62356

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.