CVE-2026-43989 PUBLISHED

JunoClaw: upload_wasm accepted arbitrary filesystem paths without validation

Assigner: GitHub_M
Reserved: 04.05.2026 Published: 12.05.2026 Updated: 12.05.2026

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink target, file size, or file format. This vulnerability is fixed in 0.x.y-security-1.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L
CVSS Score: 8.5

Product Status

Vendor Dragonmonk111
Product junoclaw
Versions
  • Version < v0.x.y-security-1 is affected

References

Problem Types

  • CWE-20: Improper Input Validation CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE
  • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE
  • CWE-73: External Control of File Name or Path CWE