CVE-2026-35570

OpenClaude is an open-source coding-agent command line interface for cloud and local model providers. Versions prior to 0.5.1 have a logic flaw in `bashToolHasPermission()` inside `src/tools/BashTool/bashPermissions.ts`. When the sandbox auto-allow feature is active and no explicit deny rule is configured, the function returns an `allow` result immediately — before the path constraint filter (`checkPathConstraints`) is ever evaluated. This allows commands containing path traversal sequences (e.g., `../../../../../etc/passwd`) to bypass directory restrictions entirely. Version 0.5.1 contains a patch for the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gitlawb:openclaude:*:*:*:*:*:*:*:*

History

23 Apr 2026, 18:37

Type Values Removed Values Added
References () https://github.com/Gitlawb/openclaude/commit/7002cb302b78ea2a19da3f26226de24e2903fa1d - () https://github.com/Gitlawb/openclaude/commit/7002cb302b78ea2a19da3f26226de24e2903fa1d - Patch
References () https://github.com/Gitlawb/openclaude/security/advisories/GHSA-m6rx-7pvw-2f73 - () https://github.com/Gitlawb/openclaude/security/advisories/GHSA-m6rx-7pvw-2f73 - Exploit, Mitigation, Vendor Advisory
CPE cpe:2.3:a:gitlawb:openclaude:*:*:*:*:*:*:*:*
First Time Gitlawb
Gitlawb openclaude

21 Apr 2026, 20:16

Type Values Removed Values Added
References () https://github.com/Gitlawb/openclaude/security/advisories/GHSA-m6rx-7pvw-2f73 - () https://github.com/Gitlawb/openclaude/security/advisories/GHSA-m6rx-7pvw-2f73 -

21 Apr 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-21 00:16

Updated : 2026-04-23 18:37


NVD link : CVE-2026-35570

Mitre link : CVE-2026-35570

CVE.ORG link : CVE-2026-35570


JSON object : View

Products Affected

gitlawb

  • openclaude
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-284

Improper Access Control