


Perceptive Security
SOC/SIEM Consultancy

The command auto-approval module in CodeRider-Kilo contains an OS Command Injection vulnerability, rendering its whitelist security mechanism ineffective. The v…
Published:
26 March 2026 at 23:00:00
Alert date:
27 March 2026 at 22:06:06
Source:
nvd.nist.gov
Operating Systems, Security Tools
The command auto-approval module in CodeRider-Kilo contains an OS Command Injection vulnerability that renders its whitelist security mechanism ineffective. The vulnerability stems from incorrect use of a Unix-based shell-quote library to analyze commands on Windows platforms, failing to handle Windows CMD-specific escape sequences. Attackers can exploit this parser discrepancy by constructing payloads like 'git log ^" & malicious_command ^"' to bypass whitelist checks. The CodeRider-Kilo parser misinterprets the malicious command connector as being within a protected string argument, while Windows CMD ignores escaped quotes and executes the malicious command directly. This allows attackers to achieve arbitrary Remote Code Execution after bypassing legitimate Git whitelist checks.
Technical details
Mitigation steps:
Affected products:
CodeRider-Kilo
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-30302
https://github.com/Secsys-FDU/LLM-Tool-Calling-CVEs/issues/3
Related CVE's:
Related threat actors:
IOC's:
git log ^" & malicious_command ^"
This article was created with the assistance of AI technology by Perceptive.
