CVE-2026-4092
Path Traversal in Clasp Enables Remote Code Execution
Publication date: 2026-03-13
Last updated on: 2026-04-14
Assigner: Google Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| clasp | to 3.2.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': "CVE-2026-4092 is a critical path traversal vulnerability in the Google clasp project versions before 3.2.0. It occurs in the fetchRemote method of the Files class, where remote filenames containing directory traversal sequences (like ../../) were not properly validated. This allowed attackers to write files outside the intended project directory on a user's local machine during operations such as clasp pull or clasp clone."}, {'type': 'paragraph', 'content': "By exploiting this flaw, an attacker could perform arbitrary file writes and potentially execute remote code on the victim's machine by crafting malicious Google Apps Script projects with specially designed filenames."}, {'type': 'paragraph', 'content': 'The vulnerability was fixed by establishing a security boundary that confines file operations within the project directory, normalizing paths, validating that resolved paths do not escape this boundary, and throwing security errors if violations occur.'}] [1]
How can this vulnerability impact me? :
This vulnerability can have severe impacts including unauthorized remote code execution on your local machine. An attacker can exploit the path traversal flaw to write arbitrary files outside the intended directory, potentially overwriting critical system or application files.
Such unauthorized file writes can lead to compromise of your system integrity, data loss, or the installation of malicious software, thereby posing a significant security risk.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability involves path traversal sequences in filenames used by the Google clasp tool during operations like `clasp pull` or `clasp clone`. Detection involves monitoring for suspicious file operations or filenames containing directory traversal patterns such as `../../`.'}, {'type': 'paragraph', 'content': 'You can check for the presence of vulnerable clasp versions (prior to 3.2.0) on your system by running the command:'}, {'type': 'list_item', 'content': '`clasp --version`'}, {'type': 'paragraph', 'content': 'To detect exploitation attempts, you can monitor file system activity or logs for attempts to write files outside the expected project directory, especially filenames containing traversal sequences.'}, {'type': 'paragraph', 'content': 'Example commands to search for suspicious filenames in project directories or logs might include:'}, {'type': 'list_item', 'content': 'On Linux/macOS, to find files with traversal sequences in names:'}, {'type': 'list_item', 'content': '`find /path/to/projects -name "*..*/*"`'}, {'type': 'list_item', 'content': 'Or to search logs for suspicious patterns:'}, {'type': 'list_item', 'content': '`grep -r "\\.\\./" /var/log/`'}] [1]
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation is to upgrade the Google clasp tool to version 3.2.0 or later, where the vulnerability has been fixed.
The fix includes strict path normalization and boundary checks that prevent directory traversal sequences from escaping the intended project directory, effectively blocking exploitation.
Until you upgrade, avoid running `clasp pull` or `clasp clone` commands on untrusted or malicious Google Apps Script projects that might contain specially crafted filenames.
Additionally, consider auditing your project directories for unexpected files or changes that might indicate exploitation attempts.