CVE-2026-4092: @google/clasp vulnerable to unsafe path traversal cloning or pulling a malicious script
(updated )
Allows an attacker to perform a “Path Traversal” attack to modify files outside the projects directory, potentially allowing for running attacker code on the developer’s machine.
References
- github.com/advisories/GHSA-hqjg-pww4-pcgq
- github.com/google/clasp
- github.com/google/clasp/commit/ba6bd666fe74de54950122b5d92ecf1dcc02a9d3
- github.com/google/clasp/pull/1109
- github.com/google/clasp/releases/tag/v3.2.0
- github.com/google/clasp/security/advisories/GHSA-hqjg-pww4-pcgq
- nvd.nist.gov/vuln/detail/CVE-2026-4092
Code Behaviors & Features
Detect and mitigate CVE-2026-4092 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →