{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T10:33:21.653","vulnerabilities":[{"cve":{"id":"CVE-2025-54377","sourceIdentifier":"security-advisories@github.com","published":"2025-07-23T21:15:27.060","lastModified":"2025-09-11T15:56:35.037","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Roo Code is an AI-powered autonomous coding agent that lives in users' editors. In versions 3.23.18 and below, RooCode does not validate line breaks (\\n) in its command input, allowing potential bypass of the allow-list mechanism. The project appears to lack parsing or validation logic to prevent multi-line command injection. When commands are evaluated for execution, only the first line or token may be considered, enabling attackers to smuggle additional commands in subsequent lines. This is fixed in version 3.23.19."},{"lang":"es","value":"Roo Code es un agente de codificación autónomo basado en IA que reside en los editores de los usuarios. En las versiones 3.23.18 y anteriores, RooCode no valida los saltos de línea (\\n) en la entrada de comandos, lo que permite eludir el mecanismo de lista blanca. El proyecto parece carecer de lógica de análisis o validación para evitar la inyección de comandos multilínea. Al evaluar la ejecución de los comandos, solo se considera la primera línea o token, lo que permite a los atacantes introducir comandos adicionales en líneas posteriores. Esto se solucionó en la versión 3.23.19."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-77"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:roocode:roo_code:*:*:*:*:*:*:*:*","versionEndExcluding":"3.23.19","matchCriteriaId":"AB19EFC9-FDEB-4551-A9D4-944FF0FB3BD0"}]}]}],"references":[{"url":"https://github.com/RooCodeInc/Roo-Code/commit/9d434c2db9b20eb5c78b698cb2b0037cd2074534","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/RooCodeInc/Roo-Code/security/advisories/GHSA-p278-52x9-cffx","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/RooCodeInc/Roo-Code/security/advisories/GHSA-p278-52x9-cffx","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}