Impact
OpenClaw versions prior to 2026.2.24 contain a sandbox bind validation vulnerability that permits attackers to bypass allowed-root and blocked-path checks by exploiting symlinked parent directories combined with non-existent leaf components. Because bind source paths originally appear inside sandbox roots but resolve to locations outside the sandbox once missing leaf components are created, the application’s isolation enforcement is weakened. This enables an attacker to read, write, or execute files outside the intended sandbox boundaries, effectively escaping the sandbox and potentially gaining elevated privileges or compromising system integrity. The weakness corresponds to CWE-22, which deals with path traversal and file disclosure errors.
Affected Systems
The affected product is OpenClaw (vendor OpenClaw). All releases prior to 2026.2.24 are vulnerable. The product is listed under CPE "cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*".
Risk and Exploitability
The vulnerability has a CVSS score of 6.9, indicating moderate severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack would likely require the attacker to influence the bind source paths used by OpenClaw, suggesting local or privileged access is necessary. However, the vulnerability renders the sandbox less reliable, increasing risk if an attacker gains control of any component that can configure bind paths.
OpenCVE Enrichment
Github GHSA