CVE-2025-58374
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-06

Last updated on: 2025-09-15

Assigner: GitHub, Inc.

Description
Roo Code is an AI-powered autonomous coding agent that lives in users' editors. Versions 3.25.23 and below contain a default list of allowed commands that do not need manual approval if auto-approve is enabled, and npm install is included in that list. Because npm install executes lifecycle scripts, if a repository’s package.json file contains a malicious postinstall script, it would be executed automatically without user approval. This means that enabling auto-approved commands and opening a malicious repo could result in arbitrary code execution. This is fixed in version 3.26.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-06
Last Modified
2025-09-15
Generated
2026-05-07
AI Q&A
2025-09-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
roocode roo_code to 3.26.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Roo Code versions 3.25.23 and below, where a default list of allowed commands can be auto-approved without manual user approval if auto-approve is enabled. The command 'npm install' is included in this list, and since 'npm install' executes lifecycle scripts, a malicious postinstall script in a repository's package.json file could be executed automatically without user approval. This can lead to arbitrary code execution when opening a malicious repository.


How can this vulnerability impact me? :

If you enable auto-approved commands and open a malicious repository, this vulnerability could allow arbitrary code execution on your system without your explicit approval. This means an attacker could run malicious scripts on your machine, potentially leading to system compromise, data loss, or unauthorized access.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately upgrade Roo Code to version 3.26.0 or later, which fixes the issue. Additionally, disable the auto-approve feature for commands, especially for 'npm install', to prevent automatic execution of potentially malicious lifecycle scripts when opening repositories.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart