Impact
OpenClaw versions before 2026.2.22 contain a path traversal flaw in the static file handler that follows symbolic links. This allows an attacker who can place a symlink inside the Control UI root directory to read files located outside the intended web‑root. The bug is a classic directory traversal (CWE‑22) combined with symbolic link following (CWE‑59), resulting in a confidentiality breach of arbitrary files on the server.
Affected Systems
All installations of OpenClaw running a build earlier than 2026.2.22 are susceptible. The vulnerability affects every deployment where the Control UI root is writable by an attacker or where user‑supplied data can reach that location.
Risk and Exploitability
The CVSS base score of 4.8 denotes a moderate severity, and the EPSS score is below 1 %, indicating a low probability of widespread exploitation at present. Because the flaw requires file‑system write access to the Control UI root, it is unlikely to be exploited remotely without additional privileges. The vulnerability is not listed in the CISA KEV catalog. Exploitation would involve creating a symlink pointing to a target file and then requesting that path through the static file handler, thereby bypassing directory confinement checks.
OpenCVE Enrichment
Github GHSA