Vulnerability Description
A vulnerability was identified in continuedev continue up to 1.2.22. This affects the function lsTool of the file core/tools/implementations/lsTool.ts of the component JSON-RPC Server. Such manipulation of the argument dirPath leads to path traversal. An attack has to be approached locally. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Continue | Continue | >= 1.2.0, <= 1.2.22 |
Related Weaknesses (CWE)
References
- https://gist.github.com/YLChen-007/da04e032993a4b2324df915f9ecf9831ExploitThird Party Advisory
- https://vuldb.com/submit/811428ExploitThird Party AdvisoryVDB Entry
- https://vuldb.com/vuln/364395Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/364395/ctiPermissions RequiredVDB Entry
- https://vuldb.com/submit/811428ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2026-8770?
CVE-2026-8770 is a vulnerability with a CVSS score of 3.3 (LOW). A vulnerability was identified in continuedev continue up to 1.2.22. This affects the function lsTool of the file core/tools/implementations/lsTool.ts of the component JSON-RPC Server. Such manipulati...
How severe is CVE-2026-8770?
CVE-2026-8770 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-8770?
Check the references section above for vendor advisories and patch information. Affected products include: Continue Continue.