Search criteria
6 vulnerabilities found for MiniClaw by 8421bit
CVE-2026-8235 (GCVE-0-2026-8235)
Vulnerability from nvd – Published: 2026-05-10 06:15 – Updated: 2026-05-11 14:58 X_Open Source
VLAI?
Title
8421bit MiniClaw System kernel.ts resolveSkillScriptPath os command injection
Summary
A vulnerability was detected in 8421bit MiniClaw 0.8.0/0.9.0. This issue affects the function resolveSkillScriptPath of the file src/kernel.ts of the component System Command Handler. The manipulation results in os command injection. The exploit is now public and may be used. The patch is identified as 223c16a1088e138838dcbd18cd65a37c35ac5a84. It is best practice to apply a patch to resolve this issue.
Severity ?
Assigner
References
8 references
| URL | Tags |
|---|---|
| https://vuldb.com/vuln/362455 | vdb-entrytechnical-description |
| https://vuldb.com/vuln/362455/cti | signaturepermissions-required |
| https://vuldb.com/submit/809001 | third-party-advisory |
| https://github.com/8421bit/MiniClaw/issues/6 | issue-tracking |
| https://github.com/8421bit/MiniClaw/pull/7 | issue-trackingpatch |
| https://github.com/8421bit/MiniClaw/issues/6#issu… | exploitissue-tracking |
| https://github.com/8421bit/MiniClaw/commit/223c16… | patch |
| https://github.com/8421bit/MiniClaw/ | product |
Credits
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-8235",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-11T14:57:49.859988Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-11T14:58:11.414Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/8421bit/MiniClaw/issues/6"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"System Command Handler"
],
"product": "MiniClaw",
"vendor": "8421bit",
"versions": [
{
"status": "affected",
"version": "0.8.0"
},
{
"status": "affected",
"version": "0.9.0"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "ybdesire (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was detected in 8421bit MiniClaw 0.8.0/0.9.0. This issue affects the function resolveSkillScriptPath of the file src/kernel.ts of the component System Command Handler. The manipulation results in os command injection. The exploit is now public and may be used. The patch is identified as 223c16a1088e138838dcbd18cd65a37c35ac5a84. It is best practice to apply a patch to resolve this issue."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 5.2,
"vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "OS Command Injection",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "Command Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-10T06:15:10.898Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-362455 | 8421bit MiniClaw System kernel.ts resolveSkillScriptPath os command injection",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/vuln/362455"
},
{
"name": "VDB-362455 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/vuln/362455/cti"
},
{
"name": "Submit #809001 | 8421bit MiniClaw 0 OS Command Injection",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/submit/809001"
},
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/8421bit/MiniClaw/issues/6"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/8421bit/MiniClaw/pull/7"
},
{
"tags": [
"exploit",
"issue-tracking"
],
"url": "https://github.com/8421bit/MiniClaw/issues/6#issue-4290453729"
},
{
"tags": [
"patch"
],
"url": "https://github.com/8421bit/MiniClaw/commit/223c16a1088e138838dcbd18cd65a37c35ac5a84"
},
{
"tags": [
"product"
],
"url": "https://github.com/8421bit/MiniClaw/"
}
],
"tags": [
"x_open-source"
],
"timeline": [
{
"lang": "en",
"time": "2026-05-09T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2026-05-09T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2026-05-09T11:46:48.000Z",
"value": "VulDB entry last update"
}
],
"title": "8421bit MiniClaw System kernel.ts resolveSkillScriptPath os command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2026-8235",
"datePublished": "2026-05-10T06:15:10.898Z",
"dateReserved": "2026-05-09T09:37:49.916Z",
"dateUpdated": "2026-05-11T14:58:11.414Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-8113 (GCVE-0-2026-8113)
Vulnerability from nvd – Published: 2026-05-07 21:15 – Updated: 2026-05-08 20:23 X_Open Source
VLAI?
Title
8421bit MiniClaw executeSkillScript kernel.ts isPathInside path traversal
Summary
A vulnerability was determined in 8421bit MiniClaw up to 43905b934cf76489ab28e4d17da28ee97970f91f. Affected by this vulnerability is the function isPathInside of the file src/kernel.ts of the component executeSkillScript. Executing a manipulation can lead to path traversal. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. This patch is called e8bd4e17e9428260f2161378356affc5ce90d6ed. It is advisable to implement a patch to correct this issue.
Severity ?
CWE
- CWE-22 - Path Traversal
Assigner
References
7 references
| URL | Tags |
|---|---|
| https://vuldb.com/vuln/361901 | vdb-entrytechnical-description |
| https://vuldb.com/vuln/361901/cti | signaturepermissions-required |
| https://vuldb.com/submit/808167 | third-party-advisory |
| https://github.com/8421bit/MiniClaw/issues/5 | exploitissue-tracking |
| https://github.com/8421bit/MiniClaw/pull/8 | issue-trackingpatch |
| https://github.com/8421bit/MiniClaw/commit/e8bd4e… | patch |
| https://github.com/8421bit/MiniClaw/ | product |
Impacted products
Credits
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-8113",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-08T20:23:07.951107Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-08T20:23:55.940Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"executeSkillScript"
],
"product": "MiniClaw",
"vendor": "8421bit",
"versions": [
{
"status": "affected",
"version": "43905b934cf76489ab28e4d17da28ee97970f91f"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "ybdesire (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was determined in 8421bit MiniClaw up to 43905b934cf76489ab28e4d17da28ee97970f91f. Affected by this vulnerability is the function isPathInside of the file src/kernel.ts of the component executeSkillScript. Executing a manipulation can lead to path traversal. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. This patch is called e8bd4e17e9428260f2161378356affc5ce90d6ed. It is advisable to implement a patch to correct this issue."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:OF/RC:C",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "Path Traversal",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-07T21:15:11.899Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-361901 | 8421bit MiniClaw executeSkillScript kernel.ts isPathInside path traversal",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/vuln/361901"
},
{
"name": "VDB-361901 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/vuln/361901/cti"
},
{
"name": "Submit #808167 | 8421bit MiniClaw 0 Path Traversal",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/submit/808167"
},
{
"tags": [
"exploit",
"issue-tracking"
],
"url": "https://github.com/8421bit/MiniClaw/issues/5"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/8421bit/MiniClaw/pull/8"
},
{
"tags": [
"patch"
],
"url": "https://github.com/8421bit/MiniClaw/commit/e8bd4e17e9428260f2161378356affc5ce90d6ed"
},
{
"tags": [
"product"
],
"url": "https://github.com/8421bit/MiniClaw/"
}
],
"tags": [
"x_open-source"
],
"timeline": [
{
"lang": "en",
"time": "2026-05-07T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2026-05-07T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2026-05-07T18:38:19.000Z",
"value": "VulDB entry last update"
}
],
"title": "8421bit MiniClaw executeSkillScript kernel.ts isPathInside path traversal"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2026-8113",
"datePublished": "2026-05-07T21:15:11.899Z",
"dateReserved": "2026-05-07T16:33:11.644Z",
"dateUpdated": "2026-05-08T20:23:55.940Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-8112 (GCVE-0-2026-8112)
Vulnerability from nvd – Published: 2026-05-07 21:00 – Updated: 2026-05-08 23:01 X_Open Source
VLAI?
Title
8421bit MiniClaw kernel.ts executeCognitivePulse os command injection
Summary
A vulnerability was found in 8421bit MiniClaw up to 223c16a1088e138838dcbd18cd65a37c35ac5a84. Affected is the function executeCognitivePulse of the file src/kernel.ts. Performing a manipulation results in os command injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The patch is named 028f62216dee9f64833d0f1cfda7c217067ceba8. To fix this issue, it is recommended to deploy a patch.
Severity ?
Assigner
References
7 references
| URL | Tags |
|---|---|
| https://vuldb.com/vuln/361900 | vdb-entrytechnical-description |
| https://vuldb.com/vuln/361900/cti | signaturepermissions-required |
| https://vuldb.com/submit/808166 | third-party-advisory |
| https://github.com/8421bit/MiniClaw/issues/4 | exploitissue-tracking |
| https://github.com/8421bit/MiniClaw/pull/7 | issue-trackingpatch |
| https://github.com/8421bit/MiniClaw/commit/028f62… | patch |
| https://github.com/8421bit/MiniClaw/ | product |
Impacted products
Credits
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-8112",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-08T23:01:21.523301Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-08T23:01:39.515Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "MiniClaw",
"vendor": "8421bit",
"versions": [
{
"status": "affected",
"version": "223c16a1088e138838dcbd18cd65a37c35ac5a84"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "ybdesire (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in 8421bit MiniClaw up to 223c16a1088e138838dcbd18cd65a37c35ac5a84. Affected is the function executeCognitivePulse of the file src/kernel.ts. Performing a manipulation results in os command injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The patch is named 028f62216dee9f64833d0f1cfda7c217067ceba8. To fix this issue, it is recommended to deploy a patch."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "OS Command Injection",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "Command Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-07T21:00:13.825Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-361900 | 8421bit MiniClaw kernel.ts executeCognitivePulse os command injection",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/vuln/361900"
},
{
"name": "VDB-361900 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/vuln/361900/cti"
},
{
"name": "Submit #808166 | 8421bit MiniClaw 0 OS Command Injection",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/submit/808166"
},
{
"tags": [
"exploit",
"issue-tracking"
],
"url": "https://github.com/8421bit/MiniClaw/issues/4"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/8421bit/MiniClaw/pull/7"
},
{
"tags": [
"patch"
],
"url": "https://github.com/8421bit/MiniClaw/commit/028f62216dee9f64833d0f1cfda7c217067ceba8"
},
{
"tags": [
"product"
],
"url": "https://github.com/8421bit/MiniClaw/"
}
],
"tags": [
"x_open-source"
],
"timeline": [
{
"lang": "en",
"time": "2026-05-07T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2026-05-07T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2026-05-07T18:38:16.000Z",
"value": "VulDB entry last update"
}
],
"title": "8421bit MiniClaw kernel.ts executeCognitivePulse os command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2026-8112",
"datePublished": "2026-05-07T21:00:13.825Z",
"dateReserved": "2026-05-07T16:33:08.416Z",
"dateUpdated": "2026-05-08T23:01:39.515Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-8235 (GCVE-0-2026-8235)
Vulnerability from cvelistv5 – Published: 2026-05-10 06:15 – Updated: 2026-05-11 14:58 X_Open Source
VLAI?
Title
8421bit MiniClaw System kernel.ts resolveSkillScriptPath os command injection
Summary
A vulnerability was detected in 8421bit MiniClaw 0.8.0/0.9.0. This issue affects the function resolveSkillScriptPath of the file src/kernel.ts of the component System Command Handler. The manipulation results in os command injection. The exploit is now public and may be used. The patch is identified as 223c16a1088e138838dcbd18cd65a37c35ac5a84. It is best practice to apply a patch to resolve this issue.
Severity ?
Assigner
References
8 references
| URL | Tags |
|---|---|
| https://vuldb.com/vuln/362455 | vdb-entrytechnical-description |
| https://vuldb.com/vuln/362455/cti | signaturepermissions-required |
| https://vuldb.com/submit/809001 | third-party-advisory |
| https://github.com/8421bit/MiniClaw/issues/6 | issue-tracking |
| https://github.com/8421bit/MiniClaw/pull/7 | issue-trackingpatch |
| https://github.com/8421bit/MiniClaw/issues/6#issu… | exploitissue-tracking |
| https://github.com/8421bit/MiniClaw/commit/223c16… | patch |
| https://github.com/8421bit/MiniClaw/ | product |
Credits
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-8235",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-11T14:57:49.859988Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-11T14:58:11.414Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/8421bit/MiniClaw/issues/6"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"System Command Handler"
],
"product": "MiniClaw",
"vendor": "8421bit",
"versions": [
{
"status": "affected",
"version": "0.8.0"
},
{
"status": "affected",
"version": "0.9.0"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "ybdesire (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was detected in 8421bit MiniClaw 0.8.0/0.9.0. This issue affects the function resolveSkillScriptPath of the file src/kernel.ts of the component System Command Handler. The manipulation results in os command injection. The exploit is now public and may be used. The patch is identified as 223c16a1088e138838dcbd18cd65a37c35ac5a84. It is best practice to apply a patch to resolve this issue."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 5.2,
"vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "OS Command Injection",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "Command Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-10T06:15:10.898Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-362455 | 8421bit MiniClaw System kernel.ts resolveSkillScriptPath os command injection",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/vuln/362455"
},
{
"name": "VDB-362455 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/vuln/362455/cti"
},
{
"name": "Submit #809001 | 8421bit MiniClaw 0 OS Command Injection",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/submit/809001"
},
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/8421bit/MiniClaw/issues/6"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/8421bit/MiniClaw/pull/7"
},
{
"tags": [
"exploit",
"issue-tracking"
],
"url": "https://github.com/8421bit/MiniClaw/issues/6#issue-4290453729"
},
{
"tags": [
"patch"
],
"url": "https://github.com/8421bit/MiniClaw/commit/223c16a1088e138838dcbd18cd65a37c35ac5a84"
},
{
"tags": [
"product"
],
"url": "https://github.com/8421bit/MiniClaw/"
}
],
"tags": [
"x_open-source"
],
"timeline": [
{
"lang": "en",
"time": "2026-05-09T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2026-05-09T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2026-05-09T11:46:48.000Z",
"value": "VulDB entry last update"
}
],
"title": "8421bit MiniClaw System kernel.ts resolveSkillScriptPath os command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2026-8235",
"datePublished": "2026-05-10T06:15:10.898Z",
"dateReserved": "2026-05-09T09:37:49.916Z",
"dateUpdated": "2026-05-11T14:58:11.414Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-8113 (GCVE-0-2026-8113)
Vulnerability from cvelistv5 – Published: 2026-05-07 21:15 – Updated: 2026-05-08 20:23 X_Open Source
VLAI?
Title
8421bit MiniClaw executeSkillScript kernel.ts isPathInside path traversal
Summary
A vulnerability was determined in 8421bit MiniClaw up to 43905b934cf76489ab28e4d17da28ee97970f91f. Affected by this vulnerability is the function isPathInside of the file src/kernel.ts of the component executeSkillScript. Executing a manipulation can lead to path traversal. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. This patch is called e8bd4e17e9428260f2161378356affc5ce90d6ed. It is advisable to implement a patch to correct this issue.
Severity ?
CWE
- CWE-22 - Path Traversal
Assigner
References
7 references
| URL | Tags |
|---|---|
| https://vuldb.com/vuln/361901 | vdb-entrytechnical-description |
| https://vuldb.com/vuln/361901/cti | signaturepermissions-required |
| https://vuldb.com/submit/808167 | third-party-advisory |
| https://github.com/8421bit/MiniClaw/issues/5 | exploitissue-tracking |
| https://github.com/8421bit/MiniClaw/pull/8 | issue-trackingpatch |
| https://github.com/8421bit/MiniClaw/commit/e8bd4e… | patch |
| https://github.com/8421bit/MiniClaw/ | product |
Impacted products
Credits
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-8113",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-08T20:23:07.951107Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-08T20:23:55.940Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"executeSkillScript"
],
"product": "MiniClaw",
"vendor": "8421bit",
"versions": [
{
"status": "affected",
"version": "43905b934cf76489ab28e4d17da28ee97970f91f"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "ybdesire (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was determined in 8421bit MiniClaw up to 43905b934cf76489ab28e4d17da28ee97970f91f. Affected by this vulnerability is the function isPathInside of the file src/kernel.ts of the component executeSkillScript. Executing a manipulation can lead to path traversal. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. This patch is called e8bd4e17e9428260f2161378356affc5ce90d6ed. It is advisable to implement a patch to correct this issue."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 4,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:OF/RC:C",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "Path Traversal",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-07T21:15:11.899Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-361901 | 8421bit MiniClaw executeSkillScript kernel.ts isPathInside path traversal",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/vuln/361901"
},
{
"name": "VDB-361901 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/vuln/361901/cti"
},
{
"name": "Submit #808167 | 8421bit MiniClaw 0 Path Traversal",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/submit/808167"
},
{
"tags": [
"exploit",
"issue-tracking"
],
"url": "https://github.com/8421bit/MiniClaw/issues/5"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/8421bit/MiniClaw/pull/8"
},
{
"tags": [
"patch"
],
"url": "https://github.com/8421bit/MiniClaw/commit/e8bd4e17e9428260f2161378356affc5ce90d6ed"
},
{
"tags": [
"product"
],
"url": "https://github.com/8421bit/MiniClaw/"
}
],
"tags": [
"x_open-source"
],
"timeline": [
{
"lang": "en",
"time": "2026-05-07T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2026-05-07T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2026-05-07T18:38:19.000Z",
"value": "VulDB entry last update"
}
],
"title": "8421bit MiniClaw executeSkillScript kernel.ts isPathInside path traversal"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2026-8113",
"datePublished": "2026-05-07T21:15:11.899Z",
"dateReserved": "2026-05-07T16:33:11.644Z",
"dateUpdated": "2026-05-08T20:23:55.940Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-8112 (GCVE-0-2026-8112)
Vulnerability from cvelistv5 – Published: 2026-05-07 21:00 – Updated: 2026-05-08 23:01 X_Open Source
VLAI?
Title
8421bit MiniClaw kernel.ts executeCognitivePulse os command injection
Summary
A vulnerability was found in 8421bit MiniClaw up to 223c16a1088e138838dcbd18cd65a37c35ac5a84. Affected is the function executeCognitivePulse of the file src/kernel.ts. Performing a manipulation results in os command injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The patch is named 028f62216dee9f64833d0f1cfda7c217067ceba8. To fix this issue, it is recommended to deploy a patch.
Severity ?
Assigner
References
7 references
| URL | Tags |
|---|---|
| https://vuldb.com/vuln/361900 | vdb-entrytechnical-description |
| https://vuldb.com/vuln/361900/cti | signaturepermissions-required |
| https://vuldb.com/submit/808166 | third-party-advisory |
| https://github.com/8421bit/MiniClaw/issues/4 | exploitissue-tracking |
| https://github.com/8421bit/MiniClaw/pull/7 | issue-trackingpatch |
| https://github.com/8421bit/MiniClaw/commit/028f62… | patch |
| https://github.com/8421bit/MiniClaw/ | product |
Impacted products
Credits
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-8112",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-08T23:01:21.523301Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-08T23:01:39.515Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "MiniClaw",
"vendor": "8421bit",
"versions": [
{
"status": "affected",
"version": "223c16a1088e138838dcbd18cd65a37c35ac5a84"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "ybdesire (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in 8421bit MiniClaw up to 223c16a1088e138838dcbd18cd65a37c35ac5a84. Affected is the function executeCognitivePulse of the file src/kernel.ts. Performing a manipulation results in os command injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The patch is named 028f62216dee9f64833d0f1cfda7c217067ceba8. To fix this issue, it is recommended to deploy a patch."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "OS Command Injection",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "Command Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-07T21:00:13.825Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-361900 | 8421bit MiniClaw kernel.ts executeCognitivePulse os command injection",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/vuln/361900"
},
{
"name": "VDB-361900 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/vuln/361900/cti"
},
{
"name": "Submit #808166 | 8421bit MiniClaw 0 OS Command Injection",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/submit/808166"
},
{
"tags": [
"exploit",
"issue-tracking"
],
"url": "https://github.com/8421bit/MiniClaw/issues/4"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/8421bit/MiniClaw/pull/7"
},
{
"tags": [
"patch"
],
"url": "https://github.com/8421bit/MiniClaw/commit/028f62216dee9f64833d0f1cfda7c217067ceba8"
},
{
"tags": [
"product"
],
"url": "https://github.com/8421bit/MiniClaw/"
}
],
"tags": [
"x_open-source"
],
"timeline": [
{
"lang": "en",
"time": "2026-05-07T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2026-05-07T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2026-05-07T18:38:16.000Z",
"value": "VulDB entry last update"
}
],
"title": "8421bit MiniClaw kernel.ts executeCognitivePulse os command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2026-8112",
"datePublished": "2026-05-07T21:00:13.825Z",
"dateReserved": "2026-05-07T16:33:08.416Z",
"dateUpdated": "2026-05-08T23:01:39.515Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}