You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
@google/clasp vulnerable to unsafe path traversal cloning or pulling a malicious script
High severity
GitHub Reviewed
Published
Mar 13, 2026
in
google/clasp
•
Updated Mar 14, 2026
Allows an attacker to perform a "Path Traversal" attack to modify files outside the projects directory, potentially allowing for running attacker code on the developer's machine.
Patches
Fixed in version 3.2.0
Workarounds
Only clone or pull scripts from trusted sources
Review the output of the pull and clone commands to verify only expected project files are modified
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Learn more on MITRE.
Impact
Allows an attacker to perform a "Path Traversal" attack to modify files outside the projects directory, potentially allowing for running attacker code on the developer's machine.
Patches
Fixed in version 3.2.0
Workarounds
pullandclonecommands to verify only expected project files are modifiedReferences