CVE-2026-45224
Crabbox < 0.9.0 Path Traversal via Islo Provider Workspace Resolution
CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
6th
Crabbox before 0.9.0 contains a path traversal vulnerability in the Islo provider's workspace path resolution that allows attackers to supply absolute or relative paths that resolve outside the intended /workspace directory. Attackers can craft a malicious .crabbox.yaml or crabbox.yaml file with traversal sequences to cause arbitrary file deletion and overwrite when sync.delete is enabled, as the workspace preparation logic executes rm -rf and mkdir -p operations on the resolved path without proper validation.
| CWE | CWE-22 |
| Vendor | openclaw |
| Product | crabbox |
| Published | May 11, 2026 |
| Last Updated | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for openclaw crabbox
Be the first to know when new high vulnerabilities affecting openclaw crabbox are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High
Affected Versions
openclaw / crabbox
0 < 0.9.0
References
github.com: https://github.com/openclaw/crabbox/releases/tag/v0.9.0 github.com: https://github.com/openclaw/crabbox/pull/65 github.com: https://github.com/openclaw/crabbox/commit/6b07193fb5670aac315ea47215651c67b8127868 vulncheck.com: https://www.vulncheck.com/advisories/crabbox-path-traversal-via-islo-provider-workspace-resolution
Credits
Chia Min Jun Lennon