CVE-2026-8235
Command Injection in MiniClaw 0.8.0/0.9.0
Publication date: 2026-05-10
Last updated on: 2026-05-10
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| 8421bit | miniclaw | 0.8.0 |
| 8421bit | miniclaw | 0.9.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-8235 is an OS command injection vulnerability in the MiniClaw application, specifically in the function resolveSkillScriptPath within the System Command Handler component. The vulnerability arises because user-controlled arguments are unsafely handled and concatenated into shell commands without proper quoting or sanitization. This allows an attacker to inject arbitrary operating system commands that get executed by the system shell.
The issue was found in the executeSkillScript function where shell commands were constructed by concatenating user inputs, enabling attackers to break out of the intended command structure and execute malicious commands remotely without authentication.
The vulnerability was fixed by replacing shell-built commands with safer methods that avoid shell interpretation, such as using the spawn function with shell disabled and serializing arguments as JSON to prevent injection.
How can this vulnerability impact me? :
This vulnerability can have severe impacts including allowing remote attackers to execute arbitrary commands on the affected system without authentication.
Potential consequences include complete server takeover, deletion of data, deployment of malware, and other destructive actions.
Because the exploit is public, attackers can easily leverage this vulnerability to compromise systems running vulnerable versions of MiniClaw.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves OS command injection through unsafe handling of user-controlled arguments in the MiniClaw application, specifically in the resolveSkillScriptPath function and executeSkillScript function. Detection can focus on monitoring for unusual or unauthorized command executions or attempts to inject shell metacharacters in skill script arguments.
Since the vulnerability allows injection of arbitrary shell commands, detection commands could include searching for suspicious process executions or command patterns that include shell metacharacters such as $(...), ``, ;, &, or | in logs or running processes.
- Use system process monitoring tools (e.g., ps, top) to identify unexpected commands or processes spawned by MiniClaw.
- Check application logs for suspicious skill script arguments containing shell metacharacters.
- Example command to search logs for suspicious input patterns: grep -E '\$\(|`|;|&|\|' /path/to/miniclaw/logs/*
- Use network monitoring tools to detect unusual outbound connections or command executions triggered by the vulnerable service.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to apply the official patch identified by commit 223c16a1088e138838dcbd18cd65a37c35ac5a84, which fixes the vulnerability by replacing unsafe shell command execution with a safer method that serializes arguments as JSON and uses execFileAsync without shell interpretation.
Until the patch is applied, it is recommended to restrict access to the vulnerable MiniClaw service to trusted users only, monitor for suspicious activity, and avoid passing untrusted input as skill script arguments.
- Apply the patch from commit 223c16a1088e138838dcbd18cd65a37c35ac5a84 immediately.
- Restrict network and user access to the MiniClaw service to prevent exploitation.
- Monitor logs and system behavior for signs of exploitation attempts.
- Consider implementing additional input validation or sandboxing measures if patching is delayed.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided context and resources do not contain information regarding the impact of CVE-2026-8235 on compliance with common standards and regulations such as GDPR or HIPAA.