Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:8421bit:miniclaw:*:*:*:*:*:*:*:* |
Sun, 10 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
8421bit
8421bit miniclaw |
|
| Vendors & Products |
8421bit
8421bit miniclaw |
Fri, 08 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in 8421bit MiniClaw up to 43905b934cf76489ab28e4d17da28ee97970f91f. Affected by this vulnerability is the function isPathInside of the file src/kernel.ts of the component executeSkillScript. Executing a manipulation can lead to path traversal. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. This patch is called e8bd4e17e9428260f2161378356affc5ce90d6ed. It is advisable to implement a patch to correct this issue. | |
| Title | 8421bit MiniClaw executeSkillScript kernel.ts isPathInside path traversal | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-08T20:23:55.940Z
Reserved: 2026-05-07T16:33:11.644Z
Link: CVE-2026-8113
Updated: 2026-05-08T20:23:40.318Z
Status : Analyzed
Published: 2026-05-07T22:16:37.680
Modified: 2026-05-14T18:02:15.327
Link: CVE-2026-8113
No data.
OpenCVE Enrichment
Updated: 2026-05-10T21:26:24Z