A vulnerability was detected in Kilo-Org kilocode up to 7.0.47. This vulnerability affects the function Bun.file of the file packages/opencode/src/kilocode/review/worktree-diff.ts of the component File Diff API Endpoint. Performing a manipulation of the argument File results in path traversal. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Project Subscriptions

Vendors Products
Kilo Code Subscribe
Kilo-org Subscribe
Kilocode Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 19 May 2026 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:kilo:kilo_code:*:*:*:*:*:visual_studio_code:*:*

Mon, 18 May 2026 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 18 May 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Kilo
Kilo kilo Code
Vendors & Products Kilo
Kilo kilo Code

Sun, 17 May 2026 22:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Kilo-Org kilocode up to 7.0.47. This vulnerability affects the function Bun.file of the file packages/opencode/src/kilocode/review/worktree-diff.ts of the component File Diff API Endpoint. Performing a manipulation of the argument File results in path traversal. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Kilo-Org kilocode File Diff API Endpoint worktree-diff.ts Bun.file path traversal
First Time appeared Kilo-org
Kilo-org kilocode
Weaknesses CWE-22
CPEs cpe:2.3:a:kilo-org:kilocode:*:*:*:*:*:*:*:*
Vendors & Products Kilo-org
Kilo-org kilocode
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-18T12:28:11.436Z

Reserved: 2026-05-17T08:55:25.121Z

Link: CVE-2026-8765

cve-icon Vulnrichment

Updated: 2026-05-18T12:28:07.676Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-17T23:17:02.480

Modified: 2026-05-19T21:21:18.060

Link: CVE-2026-8765

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T10:49:00Z

Weaknesses