Cyber Posture

CVE-2026-30314

Critical

Published: 31 March 2026

Published
31 March 2026
Modified
03 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0066 71.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Ridvay Code's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective. The system relies on fragile regular expressions to parse command structures; while it attempts to intercept dangerous operations, it fails…

more

to account for standard Shell command substitution Ridvay Code (specifically$(...)and backticks ...). An attacker can construct a command such as git log --grep="$(malicious_command)", forcing Syntx to misidentify it as a safe git operation and automatically approve it. The underlying Shell prioritizes the execution of the malicious code injected within the arguments, resulting in Remote Code Execution without any user interaction.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents OS command injection by requiring robust validation of command inputs at entry points to detect and block shell substitutions like $(...) and backticks.

prevent

Mandates timely remediation of the specific flaw in the command auto-approval module's fragile regex-based whitelisting mechanism.

prevent

Restricts types of command inputs to exclude shell metacharacters and substitutions that bypass the ineffective whitelist.

Security SummaryAI

CVE-2026-30314 is a critical OS command injection vulnerability (CWE-78) in Ridvay Code's command auto-approval module, published on 2026-03-31, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The vulnerability stems from the module's reliance on fragile regular expressions to parse and whitelist command structures, which fail to account for standard shell command substitutions like $(...) and backticks. This renders the whitelist security mechanism completely ineffective, allowing dangerous operations to bypass interception.

Attackers can exploit this remotely without privileges or user interaction by constructing commands such as git log --grep="$(malicious_command)". The system misidentifies the input as a safe git operation and automatically approves it, but the underlying shell prioritizes and executes the injected malicious code within the arguments, resulting in full remote code execution.

Mitigation details are available in advisories referenced at https://github.com/Secsys-FDU/LLM-Tool-Calling-CVEs/issues/8 and https://ridvay.com/.

Details

CWE(s)

Affected Products

ridvay
auto-approval module
≤ 0.1.1

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

CVE enables remote code execution via OS command injection in a network-accessible service using Unix shell substitutions, directly mapping to exploitation of public-facing applications (T1190) and Unix Shell abuse (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References