NanoClaw Container Vulnerability Allows Arbitrary File Access, Recursive Deletion

NanoClaw Container Vulnerability Allows Arbitrary File Access, Recursive Deletion

The National Vulnerability Database has detailed CVE-2026-7875, a critical host/container filesystem boundary vulnerability within NanoClaw. This flaw, rated 8.8 CVSS (High), impacts how NanoClaw handles outbound attachments and outbox cleanup, specifically in messages_out.id and content.files values.

Attackers can exploit this vulnerability to read arbitrary files outside the intended outbox directory by supplying crafted messages or creating symlinked outbox files. The impact isn’t limited to unauthorized reads; a successful exploit can also trigger recursive deletion of paths beyond the designated cleanup target, leading to significant data loss or system disruption.

While specific affected products are not detailed by the National Vulnerability Database, organizations utilizing NanoClaw in containerized environments must understand the severe implications. This isn’t just about data exfiltration; the ability to recursively delete files points to a critical integrity and availability risk that demands immediate attention. It’s a clear path for a compromised container to break out and impact the host system directly.

What This Means For You

  • If your organization deploys NanoClaw in any capacity, this is a red alert. The ability for a compromised container to read arbitrary host files and recursively delete data is a catastrophic failure of isolation. Immediately review your NanoClaw deployments for any available patches or workarounds addressing CVE-2026-7875 and scrutinize container configurations to ensure strict isolation and minimal privileges.

Indicators of Compromise

IDTypeIndicator
CVE-2026-7875 Path Traversal NanoClaw affected by host/container filesystem boundary vulnerability
CVE-2026-7875 Information Disclosure NanoClaw outbound attachment handling allows reading files outside outbox directory
CVE-2026-7875 DoS NanoClaw outbox cleanup allows recursive deletion of paths outside intended target
CVE-2026-7875 Path Traversal NanoClaw vulnerable to crafted messages_out.id and content.files values
CVE-2026-7875 Path Traversal NanoClaw vulnerable to creating symlinked outbox files
🔎
NanoClaw Vulnerability Details & Impact Use /latest to see if new advisories or mitigation strategies related to CVE-2026-7875 have been added to our intel.
Open Intel Bot →
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 06, 2026 at 20:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-42503: gopls Vulnerability Exposes Dev Environments to RCE

CVE-2026-42503 — gopls by default communicates via pipe. However, -port and -listen flags are supported as means of debugging. If -listen is given a value...

vulnerabilityCVEhigh-severitycwe-1327
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 3 IOCs

CVE-2026-23870: High-Severity DoS Flaw in React Server Components

CVE-2026-23870 — A denial of service vulnerability could be triggered by sending specially crafted HTTP requests to server function endpoints, this could lead to server...

vulnerabilityCVEhigh-severitydenial-of-service
/SCW Vulnerability Desk /HIGH /7.5 /⚑ 4 IOCs

CVE-2026-20219 — The REST API Of Cisco Slido Vulnerability

CVE-2026-20219 — A vulnerability in the REST API of Cisco Slido could have allowed an authenticated, remote attacker to access the social profile data of...

vulnerabilityCVEmedium-severitycwe-639
/SCW Vulnerability Desk /MEDIUM /5.4 /⚑ 2 IOCs /⚙ 3 Sigma