Description
OpenClaw versions prior to 2026.2.12 fail to validate the sessionFile path parameter, allowing authenticated gateway clients to write transcript data to arbitrary locations on the host filesystem. Attackers can supply a sessionFile path outside the sessions directory to create files and append data repeatedly, potentially causing configuration corruption or denial of service.
Published: 2026-03-05
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Write leading to configuration corruption or denial of service
Action: Patch Immediately
AI Analysis

Impact

OpenClaw versions prior to 2026.2.12 allow an authenticated gateway client to specify an arbitrary sessionFile path, bypassing validation and enabling the client to write data to any location on the host system. The vulnerability stems from CWE‑73, resulting in the ability to overwrite or create arbitrary files, which can corrupt configurations or serve as a vector for denial of service by exhausting disk space or corrupting critical files.

Affected Systems

The affected software is OpenClaw OpenClaw, with all releases below 2026.2.12 susceptible. The vulnerability specifically targets the sessionFile parameter handling within the gateway client component, meaning all installations prior to version 2026.2.12 are at risk.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity. The EPSS score is below 1%, suggesting that exploitation is not common but still possible. This vulnerability is not listed in the KEV catalog. Exploitation requires an authenticated client with access to the gateway, so attackers must first compromise a valid user account or gain legitimate gateway access, after which they can supply a crafted sessionFile path to create or overwrite files anywhere on the host. The risk is elevated if the application runs with elevated privileges or if the filesystem is writable by the process.

Generated by OpenCVE AI on April 16, 2026 at 12:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official OpenClaw update to version 2026.2.12 or later to eliminate the unvalidated sessionFile path check.
  • If an immediate patch is unavailable, restrict the OpenClaw process to a constrained filesystem environment such as a chroot or a dedicated Docker container to limit write access to only the intended sessions directory.
  • Implement filesystem monitoring or audit logging for writes to critical directories and review logs regularly for unauthorized file creation or modification.

Generated by OpenCVE AI on April 16, 2026 at 12:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-64qx-vpxx-mvqf OpenClaw has an arbitrary transcript path file write via gateway sessionFile
History

Mon, 09 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H'}


Thu, 05 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.2.12 fail to validate the sessionFile path parameter, allowing authenticated gateway clients to write transcript data to arbitrary locations on the host filesystem. Attackers can supply a sessionFile path outside the sessions directory to create files and append data repeatedly, potentially causing configuration corruption or denial of service.
Title OpenClaw < 2026.2.12 - Arbitrary File Write via Untrusted sessionFile Path
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-73
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-09T17:20:30.030Z

Reserved: 2026-02-27T19:18:01.077Z

Link: CVE-2026-28459

cve-icon Vulnrichment

Updated: 2026-03-09T17:20:21.744Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T22:16:18.670

Modified: 2026-03-09T17:39:46.190

Link: CVE-2026-28459

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:15:35Z

Weaknesses