LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-4092 - Vulnerability Analysis

N/a

Last Updated: March 16, 2026

Clasp - Path Traversal

Published: March 13, 2026Updated: March 16, 2026PoC Available

Overview

Clasp < 3.2.0 contains a path traversal caused by specially crafted filenames with directory traversal sequences in Google Apps Script projects, letting remote attackers execute arbitrary code remotely, exploit requires crafted malicious project.

Severity & Score

Severity: N/a
EPSS Score: 100.9%(Probability of exploitation in next 30 days)

Impact

Remote attackers can execute arbitrary code by exploiting path traversal in crafted Google Apps Script projects.

Mitigation

Update to version 3.2.0 or later.

Social Media Activity(1 post)

ZEN SecDB
ZEN SecDB
@secdb
Mar 16, 2026

📈 CVE Published in last 7 days (2026-03-09 - 2026-03-16) See more at https://secdb.nttzen.cloud/dashboard Total CVEs: 1301 Severity: - Critical: 114 - High: 499 - Medium: 548 - Low: 44 - None: 96 Status: - : 27 - Analyzed: 466 - Awaiting Analysis: 494 - Modified: 13 - Received: 245 - Rejected: 5 - Undergoing Analysis: 51 Top CNAs: - GitHub, Inc.: 312 - Patchstack: 140 - VulDB: 88 - VulnCheck: 88 - Adobe Systems Incorporated: 85 - Microsoft Corporation: 78 - MITRE: 76 - Wordfence: 44 - Chrome: 31 - N/A: 27 Top Affected Products: - UNKNOWN: 755 - Microsoft Windows 10 22h2: 42 - Microsoft Windows 10 21h2: 42 - Microsoft Windows Server 2022: 41 - Microsoft Windows 11 24h2: 40 - Microsoft Windows 11 23h2: 40 - Microsoft Windows 11 25h2: 40 - Microsoft Windows Server 2025: 39 - Microsoft Windows 11 26h1: 39 - Microsoft Windows Server 2019: 39 Top EPSS Score: - CVE-2025-14558 - 39.97 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14558) - CVE-2026-3909 - 27.12 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-3909) - CVE-2026-3910 - 21.89 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-3910) - CVE-2026-2413 - 11.89 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2413) - CVE-2026-26130 - 1.27 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26130) - CVE-2026-4092 - 1.01 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-4092) - CVE-2026-26791 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26791) - CVE-2026-26792 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26792) - CVE-2026-26793 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26793) - CVE-2026-26795 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26795)

View original post

GitHub Repositories(1 repo)

Details

CVE ID
CVE-2026-4092
Severity
N/a
Type
path_traversal
Status
unconfirmed
EPSS
100.9%
Social Posts
1

CWE

  • CWE-22

CVSS Metrics

N/A

EPSS Score

100.9%Probability of exploitation in the next 30 days