We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-53536

Roo Code allows Potential Remote Code Execution via .vscode/settings.json



Description

Roo Code is an AI-powered autonomous coding agent. Prior to 3.22.6, if the victim had "Write" auto-approved, an attacker with the ability to submit prompts to the agent could write to VS Code settings files and trigger code execution. There were multiple ways to achieve that. One example is with the php.validate.executablePath setting which lets you set the path for the php executable for syntax validation. The attacker could have written the path to an arbitrary command there and then created a php file to trigger it. This vulnerability is fixed in 3.22.6.

Reserved 2025-07-02 | Published 2025-07-07 | Updated 2025-07-07 | Assigner GitHub_M


HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-552: Files or Directories Accessible to External Parties

Product status

< 3.22.6
affected

References

github.com/...o-Code/security/advisories/GHSA-3765-5vjr-qjgm

github.com/...ommit/1be6fce1a6864ae63e8160b0666db2c647f2dbba

github.com/...ommit/3993406ebdc0553a32ef391a799a4fb124930a1c

cve.org (CVE-2025-53536)

nvd.nist.gov (CVE-2025-53536)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-53536

Support options

Helpdesk Chat, Email, Knowledgebase