Impact
Ridvay Code's auto‑approval module contains an OS command injection flaw that defeats its whitelist security checks. By embedding shell substitutions or backticks inside command arguments, an attacker can trick the module into approving a harmless looking command while the embedded payload executes. This flaw enables an attacker to run arbitrary commands on the host system without any user interaction, compromising confidentiality, integrity, and availability of the affected system.
Affected Systems
The vulnerability affects Ridvay's Auto‑Approval Module. No explicit version range is provided by the authors, so all builds of the module should be considered vulnerable until a patch is issued.
Risk and Exploitability
The CVSS score of 9.8 indicates critical severity. The EPSS score of less than 1% suggests current exploit prevalence is low, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack vector likely requires an attacker to supply a crafted command to the module, which may be feasible over public interfaces or by any authenticated user depending on deployment. The exploited path involves the module parsing the command string, misclassifying it as safe, and executing it through the underlying shell, leading to remote code execution.
OpenCVE Enrichment