Description
Ridvay Code's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective. The system relies on fragile regular expressions to parse command structures; while it attempts to intercept dangerous operations, it fails to account for standard Shell command substitution Ridvay Code (specifically$(...)and backticks ...). An attacker can construct a command such as git log --grep="$(malicious_command)", forcing Syntx to misidentify it as a safe git operation and automatically approve it. The underlying Shell prioritizes the execution of the malicious code injected within the arguments, resulting in Remote Code Execution without any user interaction.
Published: 2026-03-31
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Ridvay Code’s auto‑approval module contains an OS command injection flaw that completely bypasses its whitelist protection. The module uses fragile regular expressions to parse command structures, but fails to account for standard shell command substitution such as $(...) and backticks. An attacker can craft a command like git log --grep="$(malicious_command)"; the system misidentifies it as a legitimate git operation and automatically approves it, causing the underlying shell to execute the injected code. This results in remote code execution without any user interaction.

Affected Systems

The vulnerability appears in the Ridvay Code Auto‑Approval Module. No version information is provided, implying the flaw may exist across all released updates until a patch is released.

Risk and Exploitability

The CVSS score of 9.8 indicates extremely high severity. EPSS is below 1%, so the statistical likelihood of exploitation is currently low, and the issue is not listed in CISA’s KEV catalog. The attack vector is inferred to be remote, relying on an attacker’s ability to submit a command to the auto‑approval interface, possibly through a web form or API. Once the injection succeeds, the attacker gains full control over the host system, compromising confidentiality, integrity, and availability. Because no user interaction is required, exploitation could occur in unattended environments, increasing risk to unattended servers or CI/CD pipelines.

Generated by OpenCVE AI on April 3, 2026 at 19:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑issued patch for the Auto‑Approval Module as soon as it becomes available.
  • If no patch is yet released, disable the auto‑approval feature or restrict it to a whitelist of safe commands.
  • Monitor logs for unusual command execution patterns or unexpected approval of commands containing shell substitutions.
  • Contact Ridvay support to obtain an official security advisory and confirm the scope of affected releases.

Generated by OpenCVE AI on April 3, 2026 at 19:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Title Command Injection Vulnerability in Ridvay Code Auto‑Approval Module

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Ridvay auto-approval Module
CPEs cpe:2.3:a:ridvay:auto-approval_module:*:*:*:*:*:*:*:*
Vendors & Products Ridvay auto-approval Module

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title Command Injection Vulnerability in Ridvay Code Auto‑Approval Module
First Time appeared Ridvay
Ridvay ridvay Code
Vendors & Products Ridvay
Ridvay ridvay Code

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Title Command Injection in Ridvay Code Auto‑Approval Enables Remote Code Execution
Weaknesses CWE-77

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Title Command Injection in Ridvay Code Auto‑Approval Enables Remote Code Execution
Weaknesses CWE-77
CWE-78

Tue, 31 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Description Ridvay Code's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective. The system relies on fragile regular expressions to parse command structures; while it attempts to intercept dangerous operations, it fails to account for standard Shell command substitution Ridvay Code (specifically$(...)and backticks ...). An attacker can construct a command such as git log --grep="$(malicious_command)", forcing Syntx to misidentify it as a safe git operation and automatically approve it. The underlying Shell prioritizes the execution of the malicious code injected within the arguments, resulting in Remote Code Execution without any user interaction.
References

Subscriptions

Ridvay Auto-approval Module Ridvay Code
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-01T18:33:20.551Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30314

cve-icon Vulnrichment

Updated: 2026-04-01T18:33:16.132Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T15:16:13.233

Modified: 2026-04-03T15:57:23.747

Link: CVE-2026-30314

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:17:50Z

Weaknesses