{"api_version":"1","generated_at":"2026-05-12T22:17:02+00:00","cve":"CVE-2026-43989","urls":{"html":"https://cve.report/CVE-2026-43989","api":"https://cve.report/api/cve/CVE-2026-43989.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-43989","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-43989"},"summary":{"title":"JunoClaw: upload_wasm accepted arbitrary filesystem paths without validation","description":"JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink target, file size, or file format. This vulnerability is fixed in 0.x.y-security-1.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-12 17:16:20","updated_at":"2026-05-12 17:16:20"},"problem_types":["CWE-20","CWE-22","CWE-59","CWE-73","CWE-20 CWE-20: Improper Input Validation","CWE-22 CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","CWE-59 CWE-59: Improper Link Resolution Before File Access ('Link Following')","CWE-73 CWE-73: External Control of File Name or Path"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"8.5","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L","baseScore":8.5,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"8.5","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L","data":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":8.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L","version":"3.1"}}],"references":[{"url":"https://github.com/Dragonmonk111/junoclaw/releases/tag/v0.x.y-security-1","name":"https://github.com/Dragonmonk111/junoclaw/releases/tag/v0.x.y-security-1","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/Dragonmonk111/junoclaw/commit/a7886cd","name":"https://github.com/Dragonmonk111/junoclaw/commit/a7886cd","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/Dragonmonk111/junoclaw/security/advisories/GHSA-rw59-34hw-pmwp","name":"https://github.com/Dragonmonk111/junoclaw/security/advisories/GHSA-rw59-34hw-pmwp","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-43989","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43989","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Dragonmonk111","product":"junoclaw","version":"affected < v0.x.y-security-1","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"junoclaw","vendor":"Dragonmonk111","versions":[{"status":"affected","version":"< v0.x.y-security-1"}]}],"descriptions":[{"lang":"en","value":"JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink target, file size, or file format. This vulnerability is fixed in 0.x.y-security-1."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":8.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20: Improper Input Validation","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-22","description":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-59","description":"CWE-59: Improper Link Resolution Before File Access ('Link Following')","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-73","description":"CWE-73: External Control of File Name or Path","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-12T16:21:29.084Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/Dragonmonk111/junoclaw/security/advisories/GHSA-rw59-34hw-pmwp","tags":["x_refsource_CONFIRM"],"url":"https://github.com/Dragonmonk111/junoclaw/security/advisories/GHSA-rw59-34hw-pmwp"},{"name":"https://github.com/Dragonmonk111/junoclaw/commit/a7886cd","tags":["x_refsource_MISC"],"url":"https://github.com/Dragonmonk111/junoclaw/commit/a7886cd"},{"name":"https://github.com/Dragonmonk111/junoclaw/releases/tag/v0.x.y-security-1","tags":["x_refsource_MISC"],"url":"https://github.com/Dragonmonk111/junoclaw/releases/tag/v0.x.y-security-1"}],"source":{"advisory":"GHSA-rw59-34hw-pmwp","discovery":"UNKNOWN"},"title":"JunoClaw: upload_wasm accepted arbitrary filesystem paths without validation"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-43989","datePublished":"2026-05-12T16:21:29.084Z","dateReserved":"2026-05-04T20:24:31.917Z","dateUpdated":"2026-05-12T16:21:29.084Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-12 17:16:20","lastModifiedDate":"2026-05-12 17:16:20","problem_types":["CWE-20","CWE-22","CWE-59","CWE-73","CWE-20 CWE-20: Improper Input Validation","CWE-22 CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","CWE-59 CWE-59: Improper Link Resolution Before File Access ('Link Following')","CWE-73 CWE-73: External Control of File Name or Path"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L","baseScore":8.5,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":1.8,"impactScore":6}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"43989","Ordinal":"1","Title":"JunoClaw: upload_wasm accepted arbitrary filesystem paths withou","CVE":"CVE-2026-43989","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"43989","Ordinal":"1","NoteData":"JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink target, file size, or file format. This vulnerability is fixed in 0.x.y-security-1.","Type":"Description","Title":"JunoClaw: upload_wasm accepted arbitrary filesystem paths withou"}]}}}