CVE-2025-58371
📋 TL;DR
CVE-2025-58371 is a critical vulnerability in Roo Code versions 3.26.6 and below that allows remote code execution on GitHub Actions runners. Attackers can craft malicious pull request metadata to execute arbitrary commands, potentially compromising repositories, stealing secrets, and modifying code. This affects all users running vulnerable versions of Roo Code in GitHub workflows.
💻 Affected Systems
- Roo Code
📦 What is this software?
Roo Code by Roocode
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the repository including code modification, secret exfiltration, malicious package/release creation, and lateral movement to connected systems.
Likely Case
Unauthorized code execution leading to repository tampering, secret theft, and potential supply chain attacks through malicious releases.
If Mitigated
Limited impact if workflow permissions are restricted and input validation is implemented, though some risk remains.
🎯 Exploit Status
Exploitation requires ability to create or influence pull requests; GitHub advisory provides technical details.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.26.7
Vendor Advisory: https://github.com/RooCodeInc/Roo-Code/security/advisories/GHSA-xr6r-vj48-29f6
Restart Required: No
Instructions:
1. Update Roo Code to version 3.26.7 or higher. 2. Review and update GitHub Actions workflows to use the patched version. 3. Rotate any potentially exposed repository secrets.
🔧 Temporary Workarounds
Disable vulnerable workflows
allTemporarily disable GitHub Actions workflows using Roo Code until patched.
Restrict workflow permissions
allLimit GitHub Actions permissions to read-only where possible.
🧯 If You Can't Patch
- Implement strict pull request review processes to prevent malicious input
- Isolate GitHub Actions runners from sensitive systems and implement network segmentation
🔍 How to Verify
Check if Vulnerable:
Check Roo Code version in GitHub Actions workflow files; versions ≤3.26.6 are vulnerable.
Check Version:
Check package.json or workflow YAML files for Roo Code version specification.
Verify Fix Applied:
Confirm Roo Code version is ≥3.26.7 in workflow files and verify workflow execution logs show no unexpected commands.
📡 Detection & Monitoring
Log Indicators:
- Unexpected commands in GitHub Actions runner logs
- Unauthorized repository modifications
- Suspicious secret access patterns
Network Indicators:
- Unusual outbound connections from GitHub Actions runners
- Unexpected package downloads during workflow execution
SIEM Query:
source="github-actions" AND (command_execution="*" OR repository_modification="*")