Home

Description

Roo Code is an AI-powered autonomous coding agent that lives in users' editors. Versions 3.25.23 and below contain a vulnerability where .rooignore protections could be bypassed using symlinks. This allows an attacker with write access to the workspace to trick the extension into reading files that were intended to be excluded. As a result, sensitive files such as .env or configuration files could be exposed. An attacker able to modify files within the workspace could gain unauthorized access to sensitive information by bypassing .rooignore rules. This could include secrets, configuration details, or other excluded project data. This is fixed in version 3.26.0.

PUBLISHED Reserved 2025-08-29 | Published 2025-09-05 | Updated 2025-09-08 | Assigner GitHub_M




MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Problem types

CWE-59: Improper Link Resolution Before File Access ('Link Following')

Product status

< 3.26.0
affected

References

github.com/...o-Code/security/advisories/GHSA-p76r-7mc3-qh7c

github.com/RooCodeInc/Roo-Code/pull/7405

github.com/RooCodeInc/Roo-Code/releases/tag/v3.26.0

cve.org (CVE-2025-58373)

nvd.nist.gov (CVE-2025-58373)

Download JSON