Home

Description

Crabbox before 0.9.0 contains a path traversal vulnerability in the Islo provider's workspace path resolution that allows attackers to supply absolute or relative paths that resolve outside the intended /workspace directory. Attackers can craft a malicious .crabbox.yaml or crabbox.yaml file with traversal sequences to cause arbitrary file deletion and overwrite when sync.delete is enabled, as the workspace preparation logic executes rm -rf and mkdir -p operations on the resolved path without proper validation.

PUBLISHED Reserved 2026-05-11 | Published 2026-05-11 | Updated 2026-05-11 | Assigner VulnCheck




MEDIUM: 6.8CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 7.1CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H

Problem types

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
affected

Any version before 0.9.0
affected

6b07193fb5670aac315ea47215651c67b8127868 (git)
unaffected

Credits

Chia Min Jun Lennon finder

References

github.com/openclaw/crabbox/releases/tag/v0.9.0 release-notes

github.com/openclaw/crabbox/pull/65 issue-tracking

github.com/...ommit/6b07193fb5670aac315ea47215651c67b8127868 patch

www.vulncheck.com/...-via-islo-provider-workspace-resolution third-party-advisory

cve.org (CVE-2026-45224)

nvd.nist.gov (CVE-2026-45224)

Download JSON