Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. zeptoclaw
  4. ›
  5. CVE-2026-32232

CVE-2026-32232: ZeptoClaw: Path boundary checks bypass via symlink, TOCTOU, and hardlink

March 12, 2026

Workspace boundary enforcement currently has three related bypass risks. This issue tracks fixing all three in one pull request.

References

  • github.com/advisories/GHSA-2m67-cxxq-c3h8
  • github.com/qhkm/zeptoclaw
  • github.com/qhkm/zeptoclaw/commit/bf004a20d3687a0c1a9e052ec79536e30d6de134
  • github.com/qhkm/zeptoclaw/commit/f50c17e11ae3e2d40c96730abac41974ef2ee2a8
  • github.com/qhkm/zeptoclaw/pull/324
  • github.com/qhkm/zeptoclaw/releases/tag/v0.7.6
  • github.com/qhkm/zeptoclaw/security/advisories/GHSA-2m67-cxxq-c3h8
  • nvd.nist.gov/vuln/detail/CVE-2026-32232

Code Behaviors & Features

Detect and mitigate CVE-2026-32232 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.7.6

Fixed versions

  • 0.7.6

Solution

Upgrade to version 0.7.6 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • CWE-62: UNIX Hard Link

Source file

cargo/zeptoclaw/CVE-2026-32232.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 13 Mar 2026 12:17:51 +0000.