CVE-2026-43989
JunoClaw: upload_wasm accepted arbitrary filesystem paths without validation
CVSS Score
8.5
EPSS Score
0.0%
EPSS Percentile
0th
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink target, file size, or file format. This vulnerability is fixed in 0.x.y-security-1.
| CWE | CWE-20 CWE-22 CWE-59 CWE-73 |
| Vendor | dragonmonk111 |
| Product | junoclaw |
| Published | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for dragonmonk111 junoclaw
Be the first to know when new high vulnerabilities affecting dragonmonk111 junoclaw are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
Low
Affected Versions
Dragonmonk111 / junoclaw
< v0.x.y-security-1