CVE-2025-58370

Roo · Roo Multiple Products

A high-severity vulnerability has been discovered in Roo's AI-powered coding agent, which could allow a remote attacker to execute arbitrary code on a developer's workstation.

Executive summary

A high-severity vulnerability has been discovered in Roo's AI-powered coding agent, which could allow a remote attacker to execute arbitrary code on a developer's workstation. Successful exploitation could lead to the compromise of sensitive source code, theft of credentials, and unauthorized access to the corporate network. Organizations are strongly advised to apply the vendor-provided security updates immediately to mitigate this significant risk.

Vulnerability

The vulnerability exists in the way the Roo Code AI agent processes and interprets external data sources when generating or modifying code. An unauthenticated remote attacker can craft a malicious input, such as a specially formatted code comment or a file provided for analysis, which tricks the AI agent's underlying execution engine. This manipulation, often referred to as prompt injection, bypasses security controls and causes the agent to execute arbitrary system commands on the host machine with the privileges of the user running the code editor.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.1. Exploitation could have severe consequences for the organization, as developer workstations are a primary target for accessing critical assets. Potential impacts include the theft of intellectual property, such as proprietary source code and development plans, the exfiltration of sensitive credentials like API keys and passwords stored locally, and the injection of malicious code into the software supply chain. A compromised developer machine could also serve as a beachhead for an attacker to move laterally across the corporate network, escalating the incident significantly.

Remediation

Immediate Action: Apply the security updates released by Roo immediately across all workstations using the affected products. After patching, it is critical to monitor for any signs of post-patch exploitation attempts and review access logs for any anomalous activity preceding the application of the patch.

Proactive Monitoring: Implement enhanced monitoring on developer endpoints. Look for suspicious processes being spawned by the code editor or its associated plugins (e.g., powershell.exe, bash, curl, wget). Monitor for unusual outbound network connections from developer workstations to unknown or untrusted IP addresses, which could indicate data exfiltration or command-and-control communication.

Compensating Controls: If immediate patching is not feasible, consider implementing temporary compensating controls. Restrict the AI agent's network access through host-based or network firewalls to prevent it from reaching attacker-controlled servers. Where possible, run the editor and AI agent within a sandboxed or containerized environment to limit the potential impact of a successful exploit on the underlying host system.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to the high CVSS score of 8.1 and the critical nature of the assets accessible from developer workstations, this vulnerability poses a significant and immediate threat to the organization. While not currently listed on the CISA KEV list, its potential for widespread impact makes it a prime candidate for future inclusion. We strongly recommend that all system administrators prioritize the deployment of the vendor-supplied patches as the primary means of remediation. This action should be treated with the highest urgency to prevent compromise of the software development lifecycle and the theft of sensitive corporate data.