CVE-2025-58373
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-05

Last updated on: 2025-09-15

Assigner: GitHub, Inc.

Description
Roo Code is an AI-powered autonomous coding agent that lives in users' editors. Versions 3.25.23 and below contain a vulnerability where .rooignore protections could be bypassed using symlinks. This allows an attacker with write access to the workspace to trick the extension into reading files that were intended to be excluded. As a result, sensitive files such as .env or configuration files could be exposed. An attacker able to modify files within the workspace could gain unauthorized access to sensitive information by bypassing .rooignore rules. This could include secrets, configuration details, or other excluded project data. This is fixed in version 3.26.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-05
Last Modified
2025-09-15
Generated
2026-05-07
AI Q&A
2025-09-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
roocode roo_code to 3.26.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-59 The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Roo Code versions 3.25.23 and below allows an attacker with write access to the workspace to bypass .rooignore protections by using symlinks. This tricks the extension into reading files that were meant to be excluded, potentially exposing sensitive files such as .env or configuration files.


How can this vulnerability impact me? :

If an attacker can modify files in your workspace, they could exploit this vulnerability to access sensitive information that was intended to be hidden, such as secrets and configuration details. This unauthorized access could lead to information disclosure and compromise of sensitive project data.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Roo Code to version 3.26.0 or later, as this version contains the fix for the .rooignore symlink bypass vulnerability. Additionally, restrict write access to the workspace to trusted users only to prevent attackers from modifying files and exploiting the vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart