Impact
This vulnerability allows an attacker to inject arbitrary operating system commands by embedding a newline character into input that the application processes as a single whitelisted command. The command auto‑approval module disregards raw newline characters, causing the PowerShell interpreter to treat the newline as a command separator and execute both the whitelisted command and any following malicious code. As a result, an attacker can achieve Remote Code Execution on the host without user interaction.
Affected Systems
The defect resides in the command auto‑approval module of the DSAI‑Cline system. No explicit vendor or product versions are listed in the advisory, so the vulnerability applies to all deployments of that module where the newline bypass has not been mitigated.
Risk and Exploitability
The risk is high due to the remote code execution capability and the lack of any known public patches. While no EPSS score or KEV listing is available, the attack surface is likely exposed to any user capable of submitting commands to the auto‑approval mechanism. An attacker can construct a payload such as 'git log malicious_command' to trick the system into executing arbitrary code. The vulnerability therefore carries a high likelihood of exploitation in environments where the module is enabled.
OpenCVE Enrichment