Impact
The vulnerability in OpenClaw arises from improper handling of symbolic links (CWE‑367) in the system.run function, allowing attackers to bind a writable parent symlink after the approval step. This causes the program to execute commands from a different filesystem location while the visible working directory remains unchanged, potentially granting the attacker execution rights in the context of the OpenClaw process.
Affected Systems
All releases of OpenClaw prior to version 2026.2.26 are affected. The CPE string cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* denotes every Node.js based OpenClaw build without the 2026.2.26 update.
Risk and Exploitability
The CVSS score of 6.9 indicates medium severity. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that exploitation requires an attacker to have write access to the parent symbolic link within the current working directory; thus local filesystem permissions are a prerequisite. The attack vector is likely local, but the impact is to execute arbitrary commands with the privileges of the OpenClaw process.
OpenCVE Enrichment
Github GHSA