Impact
Ridvay Code’s command auto‑approval module uses fragile regular expressions to validate command syntax, but it does not protect against shell command substitution such as $(...) and backticks. An attacker can craft a benign‑looking command, for example git log --grep="$(malicious_command)", which the module mistakenly classifies as safe and automatically approves. The injected shell syntax is then executed by the underlying operating system, giving the attacker full remote code execution capability without any user interaction.
Affected Systems
The vulnerability affects any installation of Ridvay Code that includes the auto‑approval module. No specific vendor or product versions were disclosed, so all versions of this module should be considered potentially vulnerable.
Risk and Exploitability
The risk is high because successful exploitation results in full code execution on the target system. The lack of an EPSS score or KEV listing cannot be used to gauge exploitation likelihood, but the nature of the flaw—unvalidated shell substitution—suggests a readily exploitable attack path, particularly if the auto‑approval feature is enabled by default. Vulnerability severity is expected to be high due to the direct path to remote code execution.
OpenCVE Enrichment