NanoClaw Container Vulnerability Allows Arbitrary File Access, Recursive Deletion
The National Vulnerability Database has detailed CVE-2026-7875, a critical host/container filesystem boundary vulnerability within NanoClaw. This flaw, rated 8.8 CVSS (High), impacts how NanoClaw handles outbound attachments and outbox cleanup, specifically in messages_out.id and content.files values.
Attackers can exploit this vulnerability to read arbitrary files outside the intended outbox directory by supplying crafted messages or creating symlinked outbox files. The impact isn’t limited to unauthorized reads; a successful exploit can also trigger recursive deletion of paths beyond the designated cleanup target, leading to significant data loss or system disruption.
While specific affected products are not detailed by the National Vulnerability Database, organizations utilizing NanoClaw in containerized environments must understand the severe implications. This isn’t just about data exfiltration; the ability to recursively delete files points to a critical integrity and availability risk that demands immediate attention. It’s a clear path for a compromised container to break out and impact the host system directly.
What This Means For You
- If your organization deploys NanoClaw in any capacity, this is a red alert. The ability for a compromised container to read arbitrary host files and recursively delete data is a catastrophic failure of isolation. Immediately review your NanoClaw deployments for any available patches or workarounds addressing CVE-2026-7875 and scrutinize container configurations to ensure strict isolation and minimal privileges.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7875 | Path Traversal | NanoClaw affected by host/container filesystem boundary vulnerability |
| CVE-2026-7875 | Information Disclosure | NanoClaw outbound attachment handling allows reading files outside outbox directory |
| CVE-2026-7875 | DoS | NanoClaw outbox cleanup allows recursive deletion of paths outside intended target |
| CVE-2026-7875 | Path Traversal | NanoClaw vulnerable to crafted messages_out.id and content.files values |
| CVE-2026-7875 | Path Traversal | NanoClaw vulnerable to creating symlinked outbox files |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 06, 2026 at 20:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.