Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 04 May 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nvidia:nemoclaw:*:*:*:*:*:*:*:* |
Wed, 29 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 29 Apr 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nvidia
Nvidia nemoclaw |
|
| Vendors & Products |
Nvidia
Nvidia nemoclaw |
Wed, 29 Apr 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Remote Information Disclosure via Prompt Injection in NeMoClaw Sandbox Initialization |
Tue, 28 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NVIDIA NeMoClaw contains a vulnerability in the sandbox environment initialization component, where a remote attacker could cause improper access control by sending prompt-injected content that causes the agent to read and exfiltrate host environment variables not properly restricted during sandbox creation. A successful exploit of this vulnerability might lead to information disclosure. | |
| Weaknesses | CWE-497 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: nvidia
Published:
Updated: 2026-04-29T15:11:41.945Z
Reserved: 2026-01-21T19:09:36.964Z
Link: CVE-2026-24222
Updated: 2026-04-29T13:51:57.727Z
Status : Analyzed
Published: 2026-04-28T19:36:45.517
Modified: 2026-05-04T14:31:12.770
Link: CVE-2026-24222
No data.
OpenCVE Enrichment
Updated: 2026-04-29T10:10:30Z