OpenClaude is an open-source coding-agent command line interface for cloud and local model providers. Versions prior to 0.5.1 have a logic flaw in `bashToolHasPermission()` inside `src/tools/BashTool/bashPermissions.ts`. When the sandbox auto-allow feature is active and no explicit deny rule is configured, the function returns an `allow` result immediately — before the path constraint filter (`checkPathConstraints`) is ever evaluated. This allows commands containing path traversal sequences (e.g., `../../../../../etc/passwd`) to bypass directory restrictions entirely. Version 0.5.1 contains a patch for the issue.
History

Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Gitlawb
Gitlawb openclaude
Vendors & Products Gitlawb
Gitlawb openclaude

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 23:30:00 +0000

Type Values Removed Values Added
Description OpenClaude is an open-source coding-agent command line interface for cloud and local model providers. Versions prior to 0.5.1 have a logic flaw in `bashToolHasPermission()` inside `src/tools/BashTool/bashPermissions.ts`. When the sandbox auto-allow feature is active and no explicit deny rule is configured, the function returns an `allow` result immediately — before the path constraint filter (`checkPathConstraints`) is ever evaluated. This allows commands containing path traversal sequences (e.g., `../../../../../etc/passwd`) to bypass directory restrictions entirely. Version 0.5.1 contains a patch for the issue.
Title OpenClaude has Sandbox Bypass via Early-Exit Logic Flaw that Allows Path Traversal
Weaknesses CWE-22
CWE-284
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-04-20T23:24:08.324Z

Updated: 2026-04-21T19:49:30.148Z

Reserved: 2026-04-03T20:09:02.826Z

Link: CVE-2026-35570

cve-icon Vulnrichment

Updated: 2026-04-21T16:02:02.535Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-21T00:16:28.877

Modified: 2026-04-21T20:16:57.933

Link: CVE-2026-35570

cve-icon Redhat

No data.