Back to VulnFeed / CVE-2026-45224
root@hackertop:~/vulnfeed/CVE-2026-45224#
CVE-2026-45224 MEDIUM Path Traversal ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

openclaw crabbox up to 0.8.x /workspace path traversal

crabbox 9d ago Impact pending confirmation
LIFECYCLE
5.6 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability classified as critical was found in openclaw crabbox up to 0.8.x (Artificial Intelligence Software). Affected by this vulnerability is an unknown functionality of the file /workspace. Upgrading to version 0.9.0 eliminates this vulnerability. Applying the patch 6b07193fb5670aac315ea47215651c67b8127868 is able to eliminate this problem. The best possible mitigation is suggested to be upgrading to the latest version.
Root Cause Analysis
The CWE definition for the vulnerability is CWE-22. The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

Impact: As an impact it is known to affect integrity, and availability.

Countermeasure: Upgrading to version 0.9.0 eliminates this vulnerability. Applying the patch 6b07193fb5670aac315ea47215651c67b8127868 is able to eliminate this problem. The best possible mitigation is suggested to be upgrading to the latest version.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-45224 · CVSS 5.6 · Active Threat