{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-54377","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-07-21T16:12:20.733Z","datePublished":"2025-07-23T20:36:01.878Z","dateUpdated":"2025-07-23T20:48:31.557Z"},"containers":{"cna":{"title":"Roo Code Lacks Line Break Validation in its Command Execution Tool","problemTypes":[{"descriptions":[{"cweId":"CWE-77","lang":"en","description":"CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/RooCodeInc/Roo-Code/security/advisories/GHSA-p278-52x9-cffx","tags":["x_refsource_CONFIRM"],"url":"https://github.com/RooCodeInc/Roo-Code/security/advisories/GHSA-p278-52x9-cffx"},{"name":"https://github.com/RooCodeInc/Roo-Code/commit/9d434c2db9b20eb5c78b698cb2b0037cd2074534","tags":["x_refsource_MISC"],"url":"https://github.com/RooCodeInc/Roo-Code/commit/9d434c2db9b20eb5c78b698cb2b0037cd2074534"}],"affected":[{"vendor":"RooCodeInc","product":"Roo-Code","versions":[{"version":"< 3.23.19","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-07-23T20:36:01.878Z"},"descriptions":[{"lang":"en","value":"Roo Code is an AI-powered autonomous coding agent that lives in users' editors. In versions 3.23.18 and below, RooCode does not validate line breaks (\\n) in its command input, allowing potential bypass of the allow-list mechanism. The project appears to lack parsing or validation logic to prevent multi-line command injection. When commands are evaluated for execution, only the first line or token may be considered, enabling attackers to smuggle additional commands in subsequent lines. This is fixed in version 3.23.19."}],"source":{"advisory":"GHSA-p278-52x9-cffx","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/RooCodeInc/Roo-Code/security/advisories/GHSA-p278-52x9-cffx","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-23T20:48:19.792562Z","id":"CVE-2025-54377","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-23T20:48:31.557Z"}}]}}