CVE-2026-35570 PUBLISHED

OpenClaude has Sandbox Bypass via Early-Exit Logic Flaw that Allows Path Traversal

Assigner: GitHub_M
Reserved: 03.04.2026 Published: 20.04.2026 Updated: 20.04.2026

OpenClaude is an open-source coding-agent command line interface for cloud and local model providers. Versions prior to 0.5.1 have a logic flaw in bashToolHasPermission() inside src/tools/BashTool/bashPermissions.ts. When the sandbox auto-allow feature is active and no explicit deny rule is configured, the function returns an allow result immediately — before the path constraint filter (checkPathConstraints) is ever evaluated. This allows commands containing path traversal sequences (e.g., ../../../../../etc/passwd) to bypass directory restrictions entirely. Version 0.5.1 contains a patch for the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
CVSS Score: 8.4

Product Status

Vendor Gitlawb
Product openclaude
Versions
  • Version < 0.5.1 is affected

References

Problem Types

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE
  • CWE-284: Improper Access Control CWE