CVE-2026-30307 — Roo Code's command auto-approval module contains a critical OS command…
Image via opengraph.githubassets.com
🚨 CVE-2026-30307 Roo Code's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective.
Roo Code Remote Code Execution Vulnerability · Issue #7 · Secsys-FDU/LLM-Tool-Calling-CVEs
github.com
What This Means For You
- Rated critical severity — prioritize patching or mitigation.
- New vulnerability disclosed — verify if your stack is exposed.
Related ATT&CK Techniques
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-30307 | Command Injection | Roo Code command auto-approval module, vulnerable component: command parsing logic, vulnerable function: handling of shell command substitution like $(...) and backticks, affected software: Roo Code, CWE ID: CWE-78 |
| CVE-2026-30307 | RCE | Roo Code command auto-approval module, exploitation via crafted git log command with shell command substitution, e.g., git log --grep="$(malicious_command)", affected software: Roo Code |
Source & Attribution
| Source Platform | Telegram |
| Channel | CVE Notify |
| Channel ID | 1129491012 |
| Message ID | 158169 |
| Published | April 06, 2026 at 19:26 UTC |
| Original Link | https://github.com/Secsys-FDU/LLM-Tool-Calling-CVEs/issues/7 |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.
Found this interesting? Follow us on LinkedIn to stay ahead.
Share