Impact
OpenClaw versions before 2026.2.12 create transcript file paths using the sessionId and sessionFile parameters without input sanitization. This unchecked processing allows an attacker who can authenticate to the system to supply path traversal sequences such as ../../etc/passwd and read or write arbitrary files outside the designated agent sessions directory, thereby compromising confidentiality and integrity of the filesystem.
Affected Systems
The vulnerability affects the OpenClaw application released by OpenClaw. All releases earlier than 2026.2.12 are affected; the affected product is referenced in the Common Platform Enumeration as an OpenClaw OpenClaw product running in a Node.js environment.
Risk and Exploitability
The CVSS score of 8.4 rates it as High severity, while the EPSS score of less than 1% suggests a low probability of exploitation at this time and it is not listed in the CISA KEV catalog. The likely attack vector requires authentication to the OpenClaw agent, after which the attacker can exploit the unsanitized path construction to read or write sensitive files. The flaw is classified as CWE‑22 (Path Traversal).
OpenCVE Enrichment
Github GHSA