Roo Code: Symlink-bypass of .rooignore can lead to unintended file disclosure
Description
Roo Code is an AI-powered autonomous coding agent that lives in users' editors. Versions 3.25.23 and below contain a vulnerability where .rooignore protections could be bypassed using symlinks. This allows an attacker with write access to the workspace to trick the extension into reading files that were intended to be excluded. As a result, sensitive files such as .env or configuration files could be exposed. An attacker able to modify files within the workspace could gain unauthorized access to sensitive information by bypassing .rooignore rules. This could include secrets, configuration details, or other excluded project data. This is fixed in version 3.26.0.
Affected products
2- Range: <=3.25.23
- RooCodeInc/Roo-Codev5Range: < 3.26.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/RooCodeInc/Roo-Code/pull/7405mitrex_refsource_MISC
- github.com/RooCodeInc/Roo-Code/releases/tag/v3.26.0mitrex_refsource_MISC
- github.com/RooCodeInc/Roo-Code/security/advisories/GHSA-p76r-7mc3-qh7cmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.