CVE-2026-32232

ZeptoClaw is a personal AI assistant. Prior to 0.7.6, there is a Dangling Symlink Component Bypass, TOCTOU Between Validation and Use, and Hardlink Alias Bypass. This vulnerability is fixed in 0.7.6.
Configurations

Configuration 1 (hide)

cpe:2.3:a:aisarlabs:zeptoclaw:*:*:*:*:*:rust:*:*

History

19 Mar 2026, 20:59

Type Values Removed Values Added
Summary
  • (es) ZeptoClaw es un asistente personal de IA. Antes de la versión 0.7.6, existe una omisión de componente de enlace simbólico colgante, TOCTOU entre validación y uso, y omisión de alias de enlace duro. Esta vulnerabilidad está corregida en la versión 0.7.6.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:aisarlabs:zeptoclaw:*:*:*:*:*:rust:*:*
References () https://github.com/qhkm/zeptoclaw/commit/f50c17e11ae3e2d40c96730abac41974ef2ee2a8 - () https://github.com/qhkm/zeptoclaw/commit/f50c17e11ae3e2d40c96730abac41974ef2ee2a8 - Patch
References () https://github.com/qhkm/zeptoclaw/security/advisories/GHSA-2m67-cxxq-c3h8 - () https://github.com/qhkm/zeptoclaw/security/advisories/GHSA-2m67-cxxq-c3h8 - Exploit, Patch, Vendor Advisory
First Time Aisarlabs zeptoclaw
Aisarlabs

12 Mar 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-12 19:16

Updated : 2026-03-19 20:59


NVD link : CVE-2026-32232

Mitre link : CVE-2026-32232

CVE.ORG link : CVE-2026-32232


JSON object : View

Products Affected

aisarlabs

  • zeptoclaw
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-62

UNIX Hard Link