Description
The command auto-approval module in CodeRider-Kilo contains an OS Command Injection vulnerability, rendering its whitelist security mechanism ineffective. The vulnerability stems from the incorrect use of an incompatible command parser (the Unix-based shell-quote library) to analyze commands on the Windows platform, coupled with a failure to correctly handle Windows CMD-specific escape sequences (^). Attackers can exploit this discrepancy between the parsing logic and the execution environment by constructing payloads such as git log ^" & malicious_command ^". The CodeRider-Kilo parser is deceived by the escape characters, misinterpreting the malicious command connector (&) as being within a protected string argument and thus auto-approving the command. However, the underlying Windows CMD interpreter ignores the escaped quotes, parsing and executing the subsequent malicious command directly. This allows attackers to achieve arbitrary Remote Code Execution (RCE) after bypassing what appears to be a legitimate Git whitelist check.
Published: 2026-03-27
Score: n/a
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

The flaw is an OS Command Injection in the auto‑approval module of CodeRider‑Kilo on Windows. A Unix‑based shell‑quote parser was invoked on a Windows platform, mishandling CMD escape sequences and allowing a crafted command such as git log ^" & malicious_command ^" to be auto‑approved. The parser treats the ampersand as part of a string, but the Windows shell executes it, giving the attacker arbitrary command execution with the privileges of the process.

Affected Systems

All installations of CodeRider‑Kilo running on Windows are vulnerable; no specific version information is provided.

Risk and Exploitability

The vulnerability presents a high severity due to potential remote code execution. No EPSS or KEV data is available, but the ease of injection and bypass of whitelist control suggests a high likelihood of exploitation. The attack vector is inferred to be within the context of executing Git commands on the victim system where the auto‑approval module runs.

Generated by OpenCVE AI on March 27, 2026 at 17:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available vendor patch or update for CodeRider‑Kilo.
  • If no patch is available, disable the auto‑approval feature or restrict it to whitelisted safe commands.
  • Ensure the command parser used on Windows handles CMD escape sequences correctly or replace it with a Windows‑compatible solution.
  • Monitor for any execution of unexpected commands in the application logs.

Generated by OpenCVE AI on March 27, 2026 at 17:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Title OS Command Injection in CodeRider‑Kilo Auto‑Approval Module Allows Remote Code Execution on Windows
Weaknesses CWE-78

Fri, 27 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description The command auto-approval module in CodeRider-Kilo contains an OS Command Injection vulnerability, rendering its whitelist security mechanism ineffective. The vulnerability stems from the incorrect use of an incompatible command parser (the Unix-based shell-quote library) to analyze commands on the Windows platform, coupled with a failure to correctly handle Windows CMD-specific escape sequences (^). Attackers can exploit this discrepancy between the parsing logic and the execution environment by constructing payloads such as git log ^" & malicious_command ^". The CodeRider-Kilo parser is deceived by the escape characters, misinterpreting the malicious command connector (&) as being within a protected string argument and thus auto-approving the command. However, the underlying Windows CMD interpreter ignores the escaped quotes, parsing and executing the subsequent malicious command directly. This allows attackers to achieve arbitrary Remote Code Execution (RCE) after bypassing what appears to be a legitimate Git whitelist check.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-27T20:22:59.670Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30302

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T16:16:23.210

Modified: 2026-03-27T16:16:23.210

Link: CVE-2026-30302

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T20:28:55Z

Weaknesses