Description
NanoClaw version 1.2.0 and prior contains a host/container filesystem boundary vulnerability in outbound attachment handling and outbox cleanup that allows a compromised or prompt-injected container to read files outside the intended outbox directory by supplying crafted messages_out.id and content.files values or creating symlinked outbox files. Attackers can exploit this vulnerability to trigger host-side reads of arbitrary files and in some cases achieve recursive deletion of paths outside the intended cleanup target.
INFO
Published Date :
2026-05-06T16:10:46.270Z
Last Modified :
2026-05-07T16:40:29.617Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2026-7875 vulnerability.
| Vendors | Products |
|---|---|
| Qwibit |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-7875.