CVE-2026-43989: JunoClaw Agentic AI Exposes Filesystem to Agents
The National Vulnerability Database has disclosed CVE-2026-43989, a high-severity vulnerability affecting JunoClaw, an agentic AI platform built on Juno Network. Prior to version 0.x.y-security-1, the upload_wasm MCP tool in JunoClaw accepted a filesystem path directly from an agent. Crucially, there was no validation of the path’s location, symlink targets, file size, or file format.
This flaw allows an agent to upload arbitrary bytes from the underlying filesystem, effectively turning a legitimate function into a powerful exfiltration or compromise vector. The CVSS score of 8.5 (HIGH) reflects the significant impact on confidentiality and integrity, with a lesser impact on availability, stemming from the ability of a user-initiated action to lead to system compromise. It’s a classic case of inadequate input validation (CWE-20, CWE-73) compounded by path traversal (CWE-22) and symlink following (CWE-59) issues.
Defenders must recognize the implications here: an attacker who gains control of an agent within JunoClaw could leverage this to extract sensitive configuration files, source code, or even inject malicious WebAssembly modules. The fix, available in version 0.x.y-security-1, is critical for any organization utilizing JunoClaw. Patching immediately is the only viable defense against this direct path to system compromise.
What This Means For You
- If your organization uses JunoClaw, you need to immediately verify your version. Prior to 0.x.y-security-1, your agents could be exploited to exfiltrate arbitrary files from the host filesystem or introduce malicious code. Patch to the fixed version without delay.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-43989: JunoClaw upload_wasm tool arbitrary file read
title: CVE-2026-43989: JunoClaw upload_wasm tool arbitrary file read
id: scw-2026-05-12-ai-1
status: experimental
level: high
description: |
Detects the use of the JunoClaw upload_wasm tool with a file path argument, indicating a potential attempt to exploit CVE-2026-43989 by reading arbitrary files from the filesystem.
author: SCW Feed Engine (AI-generated)
date: 2026-05-12
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-43989/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: process_creation
detection:
selection:
Image|endswith:
- 'upload_wasm'
CommandLine|contains:
- '--file-path='
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-43989 | Path Traversal | JunoClaw agentic AI platform prior to version 0.x.y-security-1 |
| CVE-2026-43989 | Code Injection | JunoClaw upload_wasm MCP tool |
| CVE-2026-43989 | Misconfiguration | JunoClaw upload_wasm MCP tool lacks validation for location, symlink target, file size, or file format |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 12, 2026 at 20:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.