CVE-2026-30314
Published: 31 March 2026
Description
Ridvay Code's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective. The system relies on fragile regular expressions to parse command structures; while it attempts to intercept dangerous operations, it fails…
more
to account for standard Shell command substitution Ridvay Code (specifically$(...)and backticks ...). An attacker can construct a command such as git log --grep="$(malicious_command)", forcing Syntx to misidentify it as a safe git operation and automatically approve it. The underlying Shell prioritizes the execution of the malicious code injected within the arguments, resulting in Remote Code Execution without any user interaction.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents OS command injection by requiring robust validation of command inputs at entry points to detect and block shell substitutions like $(...) and backticks.
Mandates timely remediation of the specific flaw in the command auto-approval module's fragile regex-based whitelisting mechanism.
Restricts types of command inputs to exclude shell metacharacters and substitutions that bypass the ineffective whitelist.
Security SummaryAI
CVE-2026-30314 is a critical OS command injection vulnerability (CWE-78) in Ridvay Code's command auto-approval module, published on 2026-03-31, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The vulnerability stems from the module's reliance on fragile regular expressions to parse and whitelist command structures, which fail to account for standard shell command substitutions like $(...) and backticks. This renders the whitelist security mechanism completely ineffective, allowing dangerous operations to bypass interception.
Attackers can exploit this remotely without privileges or user interaction by constructing commands such as git log --grep="$(malicious_command)". The system misidentifies the input as a safe git operation and automatically approves it, but the underlying shell prioritizes and executes the injected malicious code within the arguments, resulting in full remote code execution.
Mitigation details are available in advisories referenced at https://github.com/Secsys-FDU/LLM-Tool-Calling-CVEs/issues/8 and https://ridvay.com/.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables remote code execution via OS command injection in a network-accessible service using Unix shell substitutions, directly mapping to exploitation of public-facing applications (T1190) and Unix Shell abuse (T1059.004).