OpenClaude is an open-source coding-agent command line interface for cloud and local model providers. Versions prior to 0.5.1 have a logic flaw in `bashToolHasPermission()` inside `src/tools/BashTool/bashPermissions.ts`. When the sandbox auto-allow feature is active and no explicit deny rule is configured, the function returns an `allow` result immediately — before the path constraint filter (`checkPathConstraints`) is ever evaluated. This allows commands containing path traversal sequences (e.g., `../../../../../etc/passwd`) to bypass directory restrictions entirely. Version 0.5.1 contains a patch for the issue.
History

Mon, 20 Apr 2026 23:30:00 +0000

Type Values Removed Values Added
Description OpenClaude is an open-source coding-agent command line interface for cloud and local model providers. Versions prior to 0.5.1 have a logic flaw in `bashToolHasPermission()` inside `src/tools/BashTool/bashPermissions.ts`. When the sandbox auto-allow feature is active and no explicit deny rule is configured, the function returns an `allow` result immediately — before the path constraint filter (`checkPathConstraints`) is ever evaluated. This allows commands containing path traversal sequences (e.g., `../../../../../etc/passwd`) to bypass directory restrictions entirely. Version 0.5.1 contains a patch for the issue.
Title OpenClaude has Sandbox Bypass via Early-Exit Logic Flaw that Allows Path Traversal
Weaknesses CWE-22
CWE-284
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-20T23:24:08.324Z

Reserved: 2026-04-03T20:09:02.826Z

Link: CVE-2026-35570

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-21T00:16:28.877

Modified: 2026-04-21T00:16:28.877

Link: CVE-2026-35570

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.