Impact
OpenClaw, prior to version 2026.2.13, permits user-supplied filenames in its browser control API to be written to disk without sufficient confinement to temporary directories. The flaw allows an attacker to supply a crafted path that traverses outside the intended temporary root, enabling writes to arbitrary locations on the filesystem. If the attacker can overwrite executable or configuration files, this could lead to remote code execution or broader system compromise.
Affected Systems
The vulnerability affects all OpenClaw releases before 2026.2.13. Specifically, any deployment that exposes the vulnerable API endpoints for trace or download operations is at risk.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity, while an EPSS score of less than 1% suggests low but non-zero likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires access to the OpenClaw API endpoints, such as POST /trace/stop, POST /wait/download, and POST /download. An attacker can craft path traversal payloads to place files outside the temporary directory, potentially overwriting critical files if permissions allow.
OpenCVE Enrichment
Github GHSA