Impact
The vulnerability arises from the resolveSkillPath function within the MiniClaw System Command Handler, allowing an attacker to inject arbitrary operating‑system commands. The issue is classified as a command injection (CWE-77 and CWE-78) and carries a CVSS score of 5.1, indicating a moderate likelihood of compromising system integrity, confidentiality, or availability once triggered.
Affected Systems
The affected product is 8421bit MiniClaw, specifically versions 0.8.0 and 0.9.0, which are subject to the exposed resolveSkillScriptPath path handler.
Risk and Exploitability
The vulnerability is publicly exposed and can be exploited by manipulating the resolveSkillScriptPath input, likely through authenticated or unauthenticated remote API calls. The EPSS score of 1% indicates a low but non-zero likelihood of exploitation, and the vulnerability is not listed in the CISA KEV catalog, but the ability to execute arbitrary OS commands continues to represent a significant risk for affected deployments.
OpenCVE Enrichment