Description
OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted files to access arbitrary host files within gateway process permissions, potentially enabling code execution through file overwrite attacks.
Published: 2026-03-19
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

OpenClaw versions before 2026.2.25 contain a symlink traversal flaw in the agents.files.get and agents.files.set methods that allow reading and writing files outside the agent workspace. Key detail from CVE description: the flaw lets attackers access arbitrary host files within gateway process permissions. Key detail from CVE description: this can lead to code execution through file overwrite attacks. The vulnerability is categorized as CWE-59 (Improper Access Control: Path Traversal). The impact is the potential compromise of confidentiality, integrity, and availability for the entire host system, and if a critical file is overwritten, full remote code execution may be achieved.

Affected Systems

Affected products are OpenClaw:OpenClaw. Key detail from CVE description: all releases prior to version 2026.2.25 are vulnerable. The Common Platform Enumeration identifies the product as a Node.js application (cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*). Operators using versions older than 2026.2.25 should verify if the agents.files API is exposed to external clients and assess the presence of allowlisted files that could be symlinked.

Risk and Exploitability

Key detail from CVSS score: the vulnerability has a CVSS score of 8.7, indicating high severity. EPSS score is not available and the vulnerability is not listed in the KEV catalog, suggesting limited public exploitation data. Key detail from CVE description: the flaw requires that an attacker can invoke the agents.files API. Based on the description it is inferred that the API must be reachable over the network or exposed through a management interface. If exposed to untrusted networks, the risk is heightened, as attackers can read sensitive host files or overwrite critical binaries, leading to system compromise.

Generated by OpenCVE AI on March 19, 2026 at 23:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch by upgrading to OpenClaw 2026.2.25 or later (key detail from vendor advisory).
  • If an upgrade cannot be performed immediately, block or restrict external access to the agents.files API using firewalls or network segmentation (inferred mitigation).
  • Monitor system and application logs for unusual file read/write operations that could indicate exploitation attempts (general best practice).

Generated by OpenCVE AI on March 19, 2026 at 23:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-fgvx-58p6-gjwc OpenClaw gateway agents.files symlink escape allowed out-of-workspace file read/write
History

Fri, 20 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted files to access arbitrary host files within gateway process permissions, potentially enabling code execution through file overwrite attacks.
Title OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-59
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-20T18:10:08.433Z

Reserved: 2026-03-10T19:48:38.210Z

Link: CVE-2026-32013

cve-icon Vulnrichment

Updated: 2026-03-20T18:03:50.131Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T22:16:34.410

Modified: 2026-03-23T18:29:35.080

Link: CVE-2026-32013

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T11:05:32Z

Weaknesses