Home

Description

NanoClaw version 1.2.0 and prior contains a host/container filesystem boundary vulnerability in outbound attachment handling and outbox cleanup that allows a compromised or prompt-injected container to read files outside the intended outbox directory by supplying crafted messages_out.id and content.files values or creating symlinked outbox files. Attackers can exploit this vulnerability to trigger host-side reads of arbitrary files and in some cases achieve recursive deletion of paths outside the intended cleanup target.

PUBLISHED Reserved 2026-05-05 | Published 2026-05-06 | Updated 2026-05-07 | Assigner VulnCheck




HIGH: 8.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

CRITICAL: 9.3CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unknown

7814e45570edf0024a1a5c2ba9fbc9cb3a49f7f7 (git)
unaffected

Any version
affected

Credits

Chia Min Jun Lennon finder

References

github.com/qwibitai/nanoclaw/pull/2001 exploit

github.com/qwibitai/nanoclaw/pull/2001

github.com/...ommit/7814e45570edf0024a1a5c2ba9fbc9cb3a49f7f7 patch

github.com/qwibitai/nanoclaw/releases/tag/v1.2.0 release-notes

cve.org (CVE-2026-7875)

nvd.nist.gov (CVE-2026-7875)

Download JSON