Impact
OpenClaw versions older than 2026.3.2 contain a path‑confinement bypass vulnerability in the browser output handling. The flaw arises from insufficient canonical path‑boundary validation during file write operations, allowing an attacker to write files outside the intended root directory and potentially overwrite arbitrary files. This weakness (CWE‑59) permits unauthorized file writes, which can compromise data integrity and may facilitate further attacks such as privilege escalation or persistence. The vulnerability does not grant direct code execution but provides a mechanism for an attacker to affect system files.
Affected Systems
Affected product: OpenClaw (Vendor: OpenClaw). All releases before version 2026.3.2, including 2026.3.1, 2026.2.x, and earlier releases, are impacted. Upgrading to 2026.3.2 or later eliminates the flaw. The CVE does not list partial versions.
Risk and Exploitability
The CVSS score of 4.8 indicates moderate severity, with the EPSS score not available and the vulnerability not included in the CISA KEV catalog. The likely attack vector involves a client interacting with a web application that utilizes OpenClaw’s browser output features; the attacker would need to supply crafted requests that trigger a file write operation. The flaw requires that the target application run in an environment where the attacker can submit input. While no exploit instances are publicly reported, the presence of a moderate severity path‑confinement bypass warrants timely remediation.
OpenCVE Enrichment
Github GHSA