CVE-2025-57771

8.1 HIGH

📋 TL;DR

This vulnerability allows command injection in Roo Code's auto-execute feature when processing crafted prompts. Attackers with access to submit prompts can execute arbitrary code alongside legitimate commands if auto-approved execution is enabled. Only users who have enabled the auto-approved command execution feature (disabled by default) are affected.

💻 Affected Systems

Products:
  • Roo Code
Versions: All versions prior to 3.25.5
Operating Systems: All platforms where Roo Code runs
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when auto-approved command execution is enabled for specific commands (disabled by default).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with arbitrary code execution leading to data theft, ransomware deployment, or complete system takeover.

🟠

Likely Case

Limited command execution within the user's context, potentially accessing sensitive files or establishing persistence.

🟢

If Mitigated

No impact if auto-approved execution is disabled or if prompt submission is restricted to trusted users.

🌐 Internet-Facing: MEDIUM - Requires attacker access to submit prompts, which could be through exposed interfaces or compromised accounts.
🏢 Internal Only: MEDIUM - Internal attackers with prompt submission access could exploit if auto-execution is enabled.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires attacker access to submit prompts and user configuration with auto-approved execution enabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.25.5

Vendor Advisory: https://github.com/RooCodeInc/Roo-Code/security/advisories/GHSA-wrh9-463x-7wvv

Restart Required: Yes

Instructions:

1. Update Roo Code to version 3.25.5 or later. 2. Restart the editor/application. 3. Verify the update was successful.

🔧 Temporary Workarounds

Disable auto-approved execution

all

Turn off the auto-approved command execution feature entirely

Check Roo Code settings and disable 'auto-approved execution' or similar features

Restrict prompt submission

all

Limit who can submit prompts to the Roo Code agent

Configure access controls to restrict prompt submission to trusted users only

🧯 If You Can't Patch

  • Disable auto-approved command execution feature immediately
  • Implement strict access controls for who can submit prompts to Roo Code

🔍 How to Verify

Check if Vulnerable:

Check Roo Code version and if auto-approved execution is enabled for any commands

Check Version:

Check within Roo Code settings or editor extension details for version number

Verify Fix Applied:

Confirm version is 3.25.5 or later and check that command parsing handles special characters properly

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns
  • Multiple commands in single execution
  • Presence of process substitution or ampersand characters in executed commands

Network Indicators:

  • Unexpected outbound connections from editor processes
  • Command execution patterns matching injection attempts

SIEM Query:

Process execution logs containing '&' or process substitution syntax from Roo Code processes

🔗 References

📤 Share & Export