Impact
DSAI‑Cline’s auto‑approval module contains a critical OS command injection flaw that disables its whitelist security. The module parses command strings and blocks dangerous operators such as ';', '&&', '||', '|', and command substitution, but fails to sanitize literal newline characters. An attacker can craft a payload that inserts a newline between a whitelisted command and malicious code, causing the underlying PowerShell interpreter to treat the newline as a command separator and execute both commands. This results in Remote Code Execution without any user interaction.
Affected Systems
The vulnerable component is the auto‑approval function of the DSAI‑Cline product. No specific version numbers are listed, so any installation that includes this component may be exposed.
Risk and Exploitability
The vulnerability has a CVSS score of 9.8, indicating a high severity impact. The EPSS score of less than 1% suggests a low probability of exploitation in the current threat landscape, and it is not yet listed in the CISA KEV catalog. Exploitation requires the attacker to provide input to the auto‑approval interface, which could be via an API, script, or other integration. The requirement for such access limits immediate surface exposure, but the potential for remote code execution makes the risk critical.
OpenCVE Enrichment