Impact
NanoClaw has a filesystem boundary flaw in its outbound attachment processing and outbox cleanup. By supplying specially crafted identifiers such as messages_out.id and content.files or creating symlinked files in the outbox, a compromised or injected container can cause the host process to read any file outside the designed outbox directory. In certain circumstances, the cleanup routine may also delete files or directories beyond the intended target, potentially removing critical host data. The weakness allows attackers to compromise confidentiality and integrity of host files, with the possible reduction of system availability if critical configuration files are removed.
Affected Systems
The vulnerability affects Qwibit’s NanoClaw product. No specific affected product versions are listed; all installations should be reviewed for exposure until a vendor patch is issued.
Risk and Exploitability
NanoClaw receives a CVSS score of 9.3, indicating high severity. The EPSS score is not available, but the lack of prior exploitation or KEV listing suggests this vulnerability may not yet be widely exploited. Attackers would need the ability to inject crafted attachment messages or create symlinks within the outbox, indicating that containers with file creation privileges or compromised within the outbound attachment flow can exploit it. The vulnerability’s path traversal nature (CWE‑22) makes exploitation straightforward once the preconditions are met.
OpenCVE Enrichment