We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-53097

Roo Code extension vulnerable to Potential Information Leakage via JSON Schema



Description

Roo Code is an AI-powered autonomous coding agent. Prior to version 3.20.3, there was an issue where the Roo Code agent's `search_files` tool did not respect the setting to disable reads outside of the VS Code workspace. This means that an attacker who was able to inject a prompt into the agent could potentially read a sensitive file and then write the information to a JSON schema. Users have the option to disable schema fetching in VS Code, but the feature is enabled by default. For users with this feature enabled, writing to the schema would trigger a network request without the user having a chance to deny. This issue is of moderate severity, since it requires the attacker to already be able to submit prompts to the agent. Version 3.20.3 fixed the issue where `search_files` did not respect the setting to limit it to the workspace. This reduces the scope of the damage if an attacker is able to take control of the agent through prompt injection or another vector.

Reserved 2025-06-25 | Published 2025-06-27 | Updated 2025-06-27 | Assigner GitHub_M


MEDIUM: 5.9CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Product status

< 3.20.3
affected

References

github.com/...o-Code/security/advisories/GHSA-wr2q-46pg-f228

github.com/...ommit/10b2fb32ed047bbd7b8d10ef185c1ed345efcc92

github.com/...ommit/7d0b22f9e659dc6c26aab0bacbea27874986e772

cve.org (CVE-2025-53097)

nvd.nist.gov (CVE-2025-53097)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-53097

Support options

Helpdesk Chat, Email, Knowledgebase