CVE-2026-8113
Awaiting Analysis Awaiting Analysis - Queue
Path Traversal in 8421bit MiniClaw

Publication date: 2026-05-07

Last updated on: 2026-05-07

Assigner: VulDB

Description
A vulnerability was determined in 8421bit MiniClaw up to 43905b934cf76489ab28e4d17da28ee97970f91f. Affected by this vulnerability is the function isPathInside of the file src/kernel.ts of the component executeSkillScript. Executing a manipulation can lead to path traversal. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. This patch is called e8bd4e17e9428260f2161378356affc5ce90d6ed. It is advisable to implement a patch to correct this issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-07
Last Modified
2026-05-07
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
8421bit miniclaw to 43905b934cf76489ab28e4d17da28ee97970f91f (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the function isPathInside of the file src/kernel.ts within the executeSkillScript component of 8421bit MiniClaw. It allows an attacker to perform a path traversal attack by manipulating inputs to this function. This means an attacker can potentially access files and directories outside the intended scope of the application.

The attack can be launched remotely, and the exploit has been publicly disclosed, making it possible for attackers to utilize it.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized remote attackers to access or manipulate files outside the intended directory structure of the application. This could lead to exposure of sensitive information or unauthorized modification of files.


What immediate steps should I take to mitigate this vulnerability?

It is advisable to implement a patch to correct this issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart