Path Traversal Vulnerability in Continuedev JSON-RPC Server from Continuedev
CVE-2026-8770
Key Information:
- Vendor
Continuedev
- Status
- Vendor
- CVE Published:
- 17 May 2026
Badges
What is CVE-2026-8770?
A path traversal vulnerability has been identified in the Continuedev Continue product, specifically in version 1.2.22. The issue exists within the lsTool function located in core/tools/implementations/lsTool.ts of the JSON-RPC Server. By manipulating the 'dirPath' argument, an attacker could potentially exploit the system locally via this vulnerability. Publicly available exploits have been noted, raising significant security concerns. Despite prior disclosure attempts to the vendor, no response has been received regarding remediation efforts.
Affected Version(s)
continue 1.2.0
continue 1.2.1
continue 1.2.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
