A vulnerability was identified in continuedev continue up to 1.2.22. This affects the function lsTool of the file core/tools/implementations/lsTool.ts of the component JSON-RPC Server. Such manipulation of the argument dirPath leads to path traversal. An attack has to be approached locally. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Project Subscriptions

Vendors Products
Continue Subscribe
Continue Subscribe
Continuedev Subscribe
Continue Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 19 May 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:continue:continue:*:*:*:*:*:*:*:* cpe:2.3:a:continue:continue:*:*:*:*:*:visual_studio_code:*:*

Tue, 19 May 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Continue
Continue continue
CPEs cpe:2.3:a:continue:continue:*:*:*:*:*:*:*:*
Vendors & Products Continue
Continue continue

Mon, 18 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 17 May 2026 23:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in continuedev continue up to 1.2.22. This affects the function lsTool of the file core/tools/implementations/lsTool.ts of the component JSON-RPC Server. Such manipulation of the argument dirPath leads to path traversal. An attack has to be approached locally. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title continuedev continue JSON-RPC Server lsTool.ts lsTool path traversal
First Time appeared Continuedev
Continuedev continue
Weaknesses CWE-22
CPEs cpe:2.3:a:continuedev:continue:*:*:*:*:*:*:*:*
Vendors & Products Continuedev
Continuedev continue
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-18T19:53:49.716Z

Reserved: 2026-05-17T09:30:17.576Z

Link: CVE-2026-8770

cve-icon Vulnrichment

Updated: 2026-05-18T19:52:03.840Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-18T00:16:37.343

Modified: 2026-05-19T17:30:31.000

Link: CVE-2026-8770

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T10:48:57Z

Weaknesses