Summary
NanoClaw 0.3.x granted excessive entitlements to its container helper process. A local attacker with low-privilege access could escalate to admin via the helper.
Details
| CVE ID | CVE-2026-26044 |
| Severity | medium (5.5) |
| CVSS vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
| Published | 2026-04-02 |
| Patched | 2026-04-04 |
| Affected versions | 0.3.0 – 0.3.4 |
| Fixed in | 0.3.5 |
| Exploited in the wild | no known exploitation |
Affected projects
What to do
- If you run an affected version: upgrade to
0.3.5immediately. Do not delay this for convenience reasons. - Rotate any credentials that may have been exposed via the affected component.
- Audit your logs for indicators of exploitation — unexpected outbound traffic, anomalous tool calls, unfamiliar authenticated sessions.
- If exploitation is confirmed, treat the host as compromised: rebuild from a clean image, rotate every secret on the host, audit lateral movement.
Sources
- NIST NVD: CVE-2026-26044 on NVD
See also: all CVEs, tracked agents, methodology.