Description
OpenClaw versions prior to 2026.2.12 construct transcript file paths using unsanitized sessionId parameters and sessionFile paths without enforcing directory containment. Authenticated attackers can exploit path traversal sequences like ../../etc/passwd in sessionId or sessionFile parameters to read or write arbitrary files outside the agent sessions directory.
Published: 2026-03-05
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Access and Potential Data Leakage
Action: Immediate Patch
AI Analysis

Impact

OpenClaw versions before 2026.2.12 create transcript file paths using the sessionId and sessionFile parameters without input sanitization. This unchecked processing allows an attacker who can authenticate to the system to supply path traversal sequences such as ../../etc/passwd and read or write arbitrary files outside the designated agent sessions directory, thereby compromising confidentiality and integrity of the filesystem.

Affected Systems

The vulnerability affects the OpenClaw application released by OpenClaw. All releases earlier than 2026.2.12 are affected; the affected product is referenced in the Common Platform Enumeration as an OpenClaw OpenClaw product running in a Node.js environment.

Risk and Exploitability

The CVSS score of 8.4 rates it as High severity, while the EPSS score of less than 1% suggests a low probability of exploitation at this time and it is not listed in the CISA KEV catalog. The likely attack vector requires authentication to the OpenClaw agent, after which the attacker can exploit the unsanitized path construction to read or write sensitive files. The flaw is classified as CWE‑22 (Path Traversal).

Generated by OpenCVE AI on April 17, 2026 at 12:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.2.12 or later, which implements proper validation of sessionId and sessionFile parameters.
  • Run the OpenClaw agent with the least privileges possible, restricting file system permissions so that even authenticated users cannot alter or read files outside the intended session directory.
  • If patching is not immediately feasible, isolate the agent’s session directory with strict access controls and consider disabling or hardening the sessionId and sessionFile parameters in the application configuration.

Generated by OpenCVE AI on April 17, 2026 at 12:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5xfq-5mr7-426q OpenClaw's unsanitized session ID enables path traversal in transcript file operations
History

Mon, 09 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Thu, 05 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.2.12 construct transcript file paths using unsanitized sessionId parameters and sessionFile paths without enforcing directory containment. Authenticated attackers can exploit path traversal sequences like ../../etc/passwd in sessionId or sessionFile parameters to read or write arbitrary files outside the agent sessions directory.
Title OpenClaw < 2026.2.12 - Path Traversal via Unsanitized sessionId and sessionFile Parameters
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-22
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-09T20:40:55.870Z

Reserved: 2026-02-27T19:20:46.462Z

Link: CVE-2026-28482

cve-icon Vulnrichment

Updated: 2026-03-09T20:40:52.402Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T22:16:23.013

Modified: 2026-03-23T14:17:48.733

Link: CVE-2026-28482

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:45:16Z

Weaknesses