medium · CVSS 5.5patched

CVE-2026-26044

NanoClaw — Apple container privilege escalation

Timeline
Disclosed2026-04-02Patch available2026-04-04Patched2026-05-03

Each rust dot is a disclosed event in this advisory's life: when it was published, when (if ever) a patch shipped and where things stand today (the dashed line). Ghosted dots are events that haven't happened yet.

Summary

NanoClaw 0.3.x granted excessive entitlements to its container helper process. A local attacker with low-privilege access could escalate to admin via the helper.

Details

CVE IDCVE-2026-26044
Severitymedium (5.5)
CVSS vectorAV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Published2026-04-02
Patched2026-04-04
Affected versions0.3.0 – 0.3.4
Fixed in0.3.5
Exploited in the wildno known exploitation

Affected AI agents

NanoClaw
Are you running NanoClaw?Paste your docker-compose.yml or requirements.txt and we'll tell you in 10 seconds whether CVE-2026-26044 hits your stack.
Scan my AI stack →

What to do

  • If you run an affected version: upgrade to 0.3.5 immediately. Do not delay this for convenience reasons.
  • Rotate any credentials that may have been exposed via the affected component.
  • Audit your logs for indicators of exploitation — unexpected outbound traffic, anomalous tool calls, unfamiliar authenticated sessions.
  • If exploitation is confirmed, treat the host as compromised: rebuild from a clean image, rotate every secret on the host, audit lateral movement.

Sources

Are you affected?

Type the version you have installed. We check it against 0.3.0 – 0.3.4.

This is a best-effort check. When in doubt, upgrade to 0.3.5.

See also: all AI CVEs, AI agents tracker, scan your AI stack, Pro alerts, methodology.