Impact
The DSAI-Cline command auto‑approval module contains an operating‑system command injection flaw. The security check relies on string parsing that removes known dangerous operators but neglects newline characters. An attacker can inject a real newline after a whitelisted command, causing the system to treat the following text as a separate command executed by PowerShell. This leads to execution of arbitrary commands without user interaction, compromising confidentiality, integrity, and availability of the host.
Affected Systems
The vulnerability is found in DSAI‑Cline’s auto‑approval feature. No specific product release or version is indicated, so any deployment relying on this module is potentially affected until an update is applied.
Risk and Exploitability
With a CVSS score of 9.8, the flaw is classified as critical, and the EPSS score of <1 % indicates a low probability of exploitation by attackers in the wild. The vulnerability is not listed in the CISA KEV catalog, but the high severity and ability to trigger arbitrary code underscore the need for urgent mitigation. The attack vector is inferred to be local input to the auto‑approval service, and the exploit requires only that the attacker can supply a payload via the standard command interface.
OpenCVE Enrichment