NanoClaw Host/Container Filesystem Boundary Vulnerability
NanoClaw is vulnerable to a host/container filesystem boundary vulnerability in outbound attachment handling and outbox cleanup, potentially allowing a compromised container to read arbitrary host files or cause recursive deletion of paths outside the intended cleanup target.
NanoClaw is susceptible to a critical vulnerability (CVE-2026-7875) residing in its handling of outbound attachments and outbox cleanup processes. This flaw allows a compromised or prompt-injected container to bypass filesystem boundaries, gaining unauthorized access to files outside of its designated outbox directory. This can be achieved through the manipulation of messages_out.id and content.files values or by the creation of symlinked outbox files. Successful exploitation allows attackers to trigger host-side reads of arbitrary files and in certain scenarios, execute recursive deletion operations beyond the intended cleanup scope. This poses a significant risk to the confidentiality and integrity of the host system.
Attack Chain
- The attacker compromises a container running NanoClaw through various means, such as exploiting an application vulnerability or leveraging prompt injection.
- The attacker crafts a malicious
messages_out.idvalue within the compromised container, pointing to a file outside the intended outbox directory. - Alternatively, the attacker creates a symbolic link (symlink) within the outbox directory, redirecting to a target file or directory on the host filesystem.
- The attacker crafts a malicious
content.filesvalue to include the manipulatedmessages_out.idor the malicious symlink. - When NanoClaw processes the outbound attachment, it incorrectly resolves the crafted path due to the filesystem boundary vulnerability.
- NanoClaw reads the arbitrary file on the host system, exposing sensitive data to the attacker.
- In cases involving recursive deletion during outbox cleanup, NanoClaw follows the malicious symlink or resolves the crafted path, potentially leading to the deletion of unintended files or directories on the host.
- The attacker gains access to sensitive information or causes denial-of-service conditions by deleting critical system files, depending on the exploited scenario.
Impact
Successful exploitation of this vulnerability (CVE-2026-7875) can result in the unauthorized disclosure of sensitive information stored on the host system. It can also lead to data loss or system instability due to the potential for recursive deletion of critical files and directories. The severity of the impact depends on the specific files and directories accessible to the compromised container and the extent of the attacker’s malicious activities.
Recommendation
- Deploy the Sigma rules provided below to detect exploitation attempts based on suspicious file access patterns within container environments.
- Implement strict input validation and sanitization for
messages_out.idandcontent.filesto prevent path traversal attacks related to CVE-2026-7875. - Enforce proper filesystem isolation and access controls to restrict container access to only necessary resources to mitigate the impact of compromised containers.
- Regularly audit and monitor container activity for suspicious behavior, such as unexpected file reads or deletions, to identify and respond to potential attacks exploiting CVE-2026-7875.
Detection coverage 2
Detect Container File Access Outside Defined Paths
highDetects processes within containers accessing files outside of defined container paths, indicating potential escape attempts.
Detect Suspicious Symlink Creation in Container Outbox
mediumDetects the creation of symbolic links within container outbox directories, a potential indicator of filesystem boundary exploitation.
Detection queries are kept inside the platform. Get full rules →