Description
Roo Code's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective. The system relies on fragile regular expressions to parse command structures; while it attempts to intercept dangerous operations, it fails to account for standard Shell command substitution Roo Code (specifically$(...)and backticks ...). An attacker can construct a command such as git log --grep="$(malicious_command)", forcing Syntx to misidentify it as a safe git operation and automatically approve it. The underlying Shell prioritizes the execution of the malicious code injected within the arguments, resulting in Remote Code Execution without any user interaction.
Published: 2026-03-30
Score: n/a
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The Roo Code command auto-approval module contains an OS command injection vulnerability that bypasses its whitelist mechanism. The module uses regular expressions to parse commands, but it fails to detect standard shell substitutions such as $(…) and backticks. An attacker can craft a command like git log --grep="$(malicious_command)" which the module treats as a safe git operation, approves it automatically, and the underlying shell executes the injected code. This allows the attacker to run arbitrary commands on the host with the permissions of the Roo Code process, leading to full remote code execution without any user interaction.

Affected Systems

The vulnerability affects instances of Roo Code that employ the command auto-approval module. No specific vendor is listed, and no version information is provided in the advisory, so any installation of Roo Code that contains this module and has not applied a vendor fix is potentially vulnerable.

Risk and Exploitability

No CVSS score or EPSS data is available, and the vulnerability is not present in the CISA KEV catalog. Nonetheless, the nature of the flaw allows an attacker with the ability to submit commands to the auto-approval system to execute arbitrary code. The likely attack vector is local or privileged access that enables the submission of crafted commands to the Roo Code process; remote exploitation would require a separate vulnerability to gain such access. Given the absence of mitigation information, the risk is considered high for affected systems, and administrators should treat it as a critical security issue.

Generated by OpenCVE AI on March 30, 2026 at 20:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑released patch or upgrade Roo Code to a version that resolves the command auto‑approval flaw.
  • Disable or remove the auto‑approval feature, and enforce manual command approval or a stricter whitelist.
  • Audit and update the regex patterns used for command validation to reject shell expansions such as $(…) and backticks.
  • Monitor system logs for unusual command execution and perform regular penetration testing to confirm the vulnerability is mitigated.

Generated by OpenCVE AI on March 30, 2026 at 20:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Title OS Command Injection in Roo Code Command Auto-Approval Module
Weaknesses CWE-78

Mon, 30 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Description Roo Code's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective. The system relies on fragile regular expressions to parse command structures; while it attempts to intercept dangerous operations, it fails to account for standard Shell command substitution Roo Code (specifically$(...)and backticks ...). An attacker can construct a command such as git log --grep="$(malicious_command)", forcing Syntx to misidentify it as a safe git operation and automatically approve it. The underlying Shell prioritizes the execution of the malicious code injected within the arguments, resulting in Remote Code Execution without any user interaction.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-30T19:05:45.827Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30307

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-30T20:16:21.220

Modified: 2026-03-30T20:16:21.220

Link: CVE-2026-30307

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:56:13Z

Weaknesses