Description
Path Traversal in Clasp impacting versions < 3.2.0 allows a remote attacker to perform remote code execution via a malicious Google Apps Script project containing specially crafted filenames with directory traversal sequences.
Published: 2026-03-13
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

Clasp, the command‑line tool for managing Google Apps Scripts, contains a path‑traversal flaw that allows an attacker to write or overwrite arbitrary files on the machine where Clasp runs. By crafting a project that includes file names with directory‑traversal sequences such as "../", a malicious user can create or modify files outside the intended project directory, potentially executing arbitrary code. The weakness is classified as CWE‑22, improper validation of file paths.

Affected Systems

All installations of Google Clasp older than version 3.2.0 are affected. The vulnerability is present regardless of the operating system, as Clasp can run on Windows, macOS, or Linux. Any user who installs a vulnerable version and imports or runs projects from untrusted sources is at risk.

Risk and Exploitability

The CVSS score of 8.7 places this flaw in the high‑risk category, while an EPSS score of 1 % indicates that widespread exploitation is currently unlikely. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. Based on the description, it is inferred that the attack vector involves supplying a malicious Google Apps Script project that contains specially crafted file names with directory‑traversal sequences. Exploitation requires that an attacker supply such a project; therefore the attack surface is limited to users who import untrusted projects. Until a patch is applied, the potential for remote code execution remains.

Generated by OpenCVE AI on April 14, 2026 at 21:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Google Clasp to version 3.2.0 or later.
  • If an immediate upgrade is not possible, restrict write permissions on the directory where Clasp stores project files.
  • Avoid importing Google Apps Script projects from untrusted sources and verify file names before execution.
  • Check the official Clasp repository for further updates or security advisories.

Generated by OpenCVE AI on April 14, 2026 at 21:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hqjg-pww4-pcgq @google/clasp vulnerable to unsafe path traversal cloning or pulling a malicious script
References
History

Tue, 14 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:google:clasp:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Mon, 16 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google clasp
Vendors & Products Google
Google clasp

Fri, 13 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description Path Traversal in Clasp impacting versions < 3.2.0 allows a remote attacker to perform remote code execution via a malicious Google Apps Script project containing specially crafted filenames with directory traversal sequences.
Title Arbitrary File Write via Path Traversal in Google clasp leading to RCE
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2026-03-16T18:34:49.535Z

Reserved: 2026-03-12T22:01:38.879Z

Link: CVE-2026-4092

cve-icon Vulnrichment

Updated: 2026-03-16T18:34:45.589Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-13T19:55:13.493

Modified: 2026-04-14T17:34:34.770

Link: CVE-2026-4092

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:00:07Z

Weaknesses