DSAI-Cline's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective. The system relies on string-based parsing to validate commands; while it intercepts dangerous operators such as ;, &&, ||, |, and command substitution patterns, it fails to account for raw newline characters embedded within the input. An attacker can construct a payload by embedding a literal newline between a whitelisted command and malicious code (e.g., git log malicious_command), forcing DSAI-Cline to misidentify it as a safe operation and automatically approve it. The underlying PowerShell interpreter treats the newline as a command separator, executing both commands sequentially, resulting in Remote Code Execution without any user interaction.
History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title OS Command Injection via Newline in DSAI‑Cline Auto‑Approval Module
First Time appeared Necboy
Necboy dsaic-line
Vendors & Products Necboy
Necboy dsaic-line

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Title Command Injection Vulnerability in DSAI-Cline Auto-Approval Module
Weaknesses CWE-20

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Title Command Injection Vulnerability in DSAI-Cline Auto-Approval Module
Weaknesses CWE-20
CWE-78

Tue, 31 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Description DSAI-Cline's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective. The system relies on string-based parsing to validate commands; while it intercepts dangerous operators such as ;, &&, ||, |, and command substitution patterns, it fails to account for raw newline characters embedded within the input. An attacker can construct a payload by embedding a literal newline between a whitelisted command and malicious code (e.g., git log malicious_command), forcing DSAI-Cline to misidentify it as a safe operation and automatically approve it. The underlying PowerShell interpreter treats the newline as a command separator, executing both commands sequentially, resulting in Remote Code Execution without any user interaction.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-03-31T00:00:00.000Z

Updated: 2026-04-01T18:37:51.891Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30312

cve-icon Vulnrichment

Updated: 2026-04-01T18:37:45.771Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-31T15:16:13.110

Modified: 2026-04-01T19:16:30.667

Link: CVE-2026-30312

cve-icon Redhat

No data.