CVE-2026-8113
Path Traversal in 8421bit MiniClaw
Publication date: 2026-05-07
Last updated on: 2026-05-07
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| 8421bit | miniclaw | to 43905b934cf76489ab28e4d17da28ee97970f91f (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the function isPathInside of the file src/kernel.ts within the executeSkillScript component of 8421bit MiniClaw. It allows an attacker to perform a path traversal attack by manipulating inputs to this function. This means an attacker can potentially access files and directories outside the intended scope of the application.
The attack can be launched remotely, and the exploit has been publicly disclosed, making it possible for attackers to utilize it.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing unauthorized remote attackers to access or manipulate files outside the intended directory structure of the application. This could lead to exposure of sensitive information or unauthorized modification of files.
What immediate steps should I take to mitigate this vulnerability?
It is advisable to implement a patch to correct this issue.