VYPR
Low severity3.3NVD Advisory· Published May 18, 2026· Updated May 19, 2026

CVE-2026-8770

CVE-2026-8770

Description

A vulnerability was identified in continuedev continue up to 1.2.22. This affects the function lsTool of the file core/tools/implementations/lsTool.ts of the component JSON-RPC Server. Such manipulation of the argument dirPath leads to path traversal. An attack has to be approached locally. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A low-severity path traversal in Continue's lsTool allows unauthenticated local attackers to enumerate arbitrary directory contents, bypassing workspace boundary checks.

A path traversal vulnerability has been identified in continuedev continue, affecting versions up to 1.2.22. The flaw resides in the lsTool function within core/tools/implementations/lsTool.ts, part of the JSON-RPC server. Unlike other file manipulation tools such as readFile or createNewFile, which call the security check throwIfFileIsSecurityConcern after resolving a user-supplied path, lsTool omits this critical validation. As a result, when an attacker provides an absolute path (e.g., /etc) as the dirPath argument, the tool directly operates on it without enforcing workspace boundaries or security patterns [1].

Exploitation requires only a locally reachable JSON-RPC instance (default TCP port 3000) or a prompt injection vector that can trigger the tool. A proof-of-concept Python script demonstrates how an unauthenticated attacker can connect to the Core server and invoke lsTool with arbitrary directory paths. Furthermore, the walkDir function is explicitly configured with overrideDefaultIgnores: ignore(), which disables the default blocklists that normally hide sensitive files (e.g., .ssh, .env), enabling thorough directory enumeration [1].

The impact is limited to file enumeration—an attacker can list the contents of sensitive directories such as /etc/ or ~/.ssh/, but cannot read the contents of files. This can expose system filenames and directory layouts, potentially aiding further targeted attacks. The vulnerability is classified as low severity (CVSS v3 base score 3.3) due to the requirement for local access and the lack of direct data exfiltration [1].

As of the advisory publication date, the vendor (continuedev) was contacted but did not respond. No official patch or workaround has been released. Users are advised to restrict access to the JSON-RPC server (e.g., binding only to localhost and using authentication) or to monitor for future updates that address the missing security check in lsTool [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.