CVE-2026-30302

CodeRider · CodeRider-Kilo

CodeRider-Kilo contains an OS command injection vulnerability due to improper parsing of Windows escape sequences using a Unix-based library, allowing unauthenticated remote code execution.

Executive summary

An unauthenticated attacker can achieve full Remote Code Execution (RCE) on Windows-based CodeRider-Kilo installations by bypassing the command whitelist via crafted escape characters.

Vulnerability

This is an OS Command Injection vulnerability occurring in the command auto-approval module. An unauthenticated attacker can exploit a discrepancy between the Unix-based shell-quote parser and the Windows CMD interpreter by using the ^ escape character to hide malicious commands within a legitimate Git whitelist request.

Business impact

A successful exploit grants the attacker the ability to execute arbitrary commands with the privileges of the application service. This can lead to total system compromise, unauthorized data exfiltration, and the installation of persistent backdoors. Given the CVSS score of 10.0, this represents the highest possible technical risk to the organization's infrastructure.

Remediation

Immediate Action: Update CodeRider-Kilo to the latest available version immediately to resolve the parser incompatibility.

Proactive Monitoring: Review system logs for unusual Git command patterns, specifically those containing unusual escape characters like ^, &, or nested quotes.

Compensating Controls: Implement strict egress filtering on the host to prevent the server from communicating with unknown external IP addresses following a potential compromise.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability is critical because it bypasses primary security whitelists through a fundamental logic error in environment-specific parsing. Organizations running CodeRider-Kilo on Windows environments must prioritize this update above all other maintenance tasks. Immediate patching is the only effective way to mitigate the risk of arbitrary code execution.