Impact
The vulnerability is a command injection flaw (CWE‑78) in the auto‑approval module of CodeRider‑Kilo. By exploiting a mismatch between the Unix‑based shell‑quote parser and the Windows command processor, an attacker can craft a string such as git log ^" & malicious_command ^" that the parser deems safe and auto‑approves, but the Windows CMD interpreter executes the injected connector and runs the malicious command. This flaw directly allows remote code execution on the host, giving attackers full control over the executing process.
Affected Systems
The affected product is CodeRider‑Kilo from the coderider‑kilo vendor. The provided advisory does not list specific version numbers, so any installation that includes the auto‑approval feature is potentially vulnerable. The CPE string indicates that all releases of the CodeRider component are impacted.
Risk and Exploitability
The CVSS score of 10 signals a critical severity, while the EPSS score of less than 1 % suggests that exploitation is not yet common. The vulnerability is not within the CISA KEV catalog, which may indicate limited public awareness. The likely attack vector is through the auto‑approval interface or API that accepts untrusted command strings. Because the flaw bypasses the whitelist, an attacker with sufficient permissions to trigger the auto‑approval can execute arbitrary commands under the privileges of the CodeRider service.
OpenCVE Enrichment