CVE-2025-65946
📋 TL;DR
CVE-2025-65946 is a command injection vulnerability in Roo Code AI coding agent versions before 3.26.7. Due to improper validation, Roo could automatically execute commands not on its allow list, potentially allowing arbitrary code execution. This affects all users of vulnerable Roo Code versions.
💻 Affected Systems
- Roo Code
📦 What is this software?
Roo Code by Roocode
⚠️ Risk & Real-World Impact
Worst Case
Attackers could achieve remote code execution with the privileges of the Roo Code process, potentially leading to full system compromise, data theft, or lateral movement.
Likely Case
Malicious actors could execute arbitrary commands on affected systems, potentially installing malware, exfiltrating sensitive data, or disrupting development workflows.
If Mitigated
With proper network segmentation and least privilege principles, impact could be limited to the isolated development environment.
🎯 Exploit Status
Exploitation requires triggering Roo's command execution feature with malicious input.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.26.7
Vendor Advisory: https://github.com/RooCodeInc/Roo-Code/security/advisories/GHSA-hwm7-w97p-4h8p
Restart Required: Yes
Instructions:
1. Update Roo Code to version 3.26.7 or later via your package manager or editor extension marketplace. 2. Restart your editor/IDE. 3. Verify the update completed successfully.
🔧 Temporary Workarounds
Disable Roo Code
allTemporarily disable the Roo Code extension/plugin until patching is possible.
# For VS Code: code --disable-extension roo.roo-code
# For other editors: disable via extension manager
Restrict Roo Permissions
allRun Roo Code with minimal privileges and restrict its access to sensitive directories.
# Run editor with limited user account
# Use OS-level sandboxing tools
🧯 If You Can't Patch
- Disable Roo Code entirely until patching is possible.
- Isolate development systems from production networks and sensitive data.
🔍 How to Verify
Check if Vulnerable:
Check Roo Code version in your editor's extension manager or via command line: roo --version
Check Version:
roo --version
Verify Fix Applied:
Confirm version is 3.26.7 or higher and test that Roo only executes allowed commands.
📡 Detection & Monitoring
Log Indicators:
- Unexpected command execution by Roo Code process
- Commands with unusual arguments or paths
- Roo Code process spawning unexpected child processes
Network Indicators:
- Roo Code process making unexpected network connections
- Outbound connections to suspicious domains/IPs
SIEM Query:
process_name:"roo" AND (command_line:* OR parent_process:editor*)