Description
The command auto-approval module in CodeRider-Kilo contains an OS Command Injection vulnerability, rendering its whitelist security mechanism ineffective. The vulnerability stems from the incorrect use of an incompatible command parser (the Unix-based shell-quote library) to analyze commands on the Windows platform, coupled with a failure to correctly handle Windows CMD-specific escape sequences (^). Attackers can exploit this discrepancy between the parsing logic and the execution environment by constructing payloads such as git log ^" & malicious_command ^". The CodeRider-Kilo parser is deceived by the escape characters, misinterpreting the malicious command connector (&) as being within a protected string argument and thus auto-approving the command. However, the underlying Windows CMD interpreter ignores the escaped quotes, parsing and executing the subsequent malicious command directly. This allows attackers to achieve arbitrary Remote Code Execution (RCE) after bypassing what appears to be a legitimate Git whitelist check.
Published: 2026-03-27
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a command injection flaw (CWE‑78) in the auto‑approval module of CodeRider‑Kilo. By exploiting a mismatch between the Unix‑based shell‑quote parser and the Windows command processor, an attacker can craft a string such as git log ^" & malicious_command ^" that the parser deems safe and auto‑approves, but the Windows CMD interpreter executes the injected connector and runs the malicious command. This flaw directly allows remote code execution on the host, giving attackers full control over the executing process.

Affected Systems

The affected product is CodeRider‑Kilo from the coderider‑kilo vendor. The provided advisory does not list specific version numbers, so any installation that includes the auto‑approval feature is potentially vulnerable. The CPE string indicates that all releases of the CodeRider component are impacted.

Risk and Exploitability

The CVSS score of 10 signals a critical severity, while the EPSS score of less than 1 % suggests that exploitation is not yet common. The vulnerability is not within the CISA KEV catalog, which may indicate limited public awareness. The likely attack vector is through the auto‑approval interface or API that accepts untrusted command strings. Because the flaw bypasses the whitelist, an attacker with sufficient permissions to trigger the auto‑approval can execute arbitrary commands under the privileges of the CodeRider service.

Generated by OpenCVE AI on April 2, 2026 at 23:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor patch or update that resolves the command parsing issue.
  • If no patch is available, disable the auto‑approval feature or restrict it to trusted users only.
  • Adjust the command parser to use a Windows‑compatible quoting library and correctly handle CMD escape sequences.
  • Enforce network or host‑based controls to block unexpected outbound connections or command executions by the CodeRider service.

Generated by OpenCVE AI on April 2, 2026 at 23:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title OS Command Injection in CodeRider‑Kilo Auto‑Approval Module Enables Remote Code Execution

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Coderider-kilo
Coderider-kilo coderider
CPEs cpe:2.3:a:coderider-kilo:coderider:*:*:*:*:*:*:*:*
Vendors & Products Coderider-kilo
Coderider-kilo coderider

Mon, 30 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Coderider
Coderider coderider-kilo
Vendors & Products Coderider
Coderider coderider-kilo

Sun, 29 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Title OS Command Injection in CodeRider‑Kilo Auto‑Approval Module Allows Remote Code Execution on Windows

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Title OS Command Injection in CodeRider‑Kilo Auto‑Approval Module Allows Remote Code Execution on Windows
Weaknesses CWE-78

Fri, 27 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description The command auto-approval module in CodeRider-Kilo contains an OS Command Injection vulnerability, rendering its whitelist security mechanism ineffective. The vulnerability stems from the incorrect use of an incompatible command parser (the Unix-based shell-quote library) to analyze commands on the Windows platform, coupled with a failure to correctly handle Windows CMD-specific escape sequences (^). Attackers can exploit this discrepancy between the parsing logic and the execution environment by constructing payloads such as git log ^" & malicious_command ^". The CodeRider-Kilo parser is deceived by the escape characters, misinterpreting the malicious command connector (&) as being within a protected string argument and thus auto-approving the command. However, the underlying Windows CMD interpreter ignores the escaped quotes, parsing and executing the subsequent malicious command directly. This allows attackers to achieve arbitrary Remote Code Execution (RCE) after bypassing what appears to be a legitimate Git whitelist check.
References

Subscriptions

Coderider Coderider-kilo
Coderider-kilo Coderider
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-27T20:22:59.670Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30302

cve-icon Vulnrichment

Updated: 2026-03-27T20:21:21.733Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T16:16:23.210

Modified: 2026-04-02T19:59:53.887

Link: CVE-2026-30302

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:38:40Z

Weaknesses