Description
OpenClaw versions prior to 2026.2.26 contain a path traversal vulnerability in workspace boundary validation that allows attackers to write files outside the workspace through in-workspace symlinks pointing to non-existent out-of-root targets. The vulnerability exists because the boundary check improperly resolves aliases, permitting the first write operation to escape the workspace boundary and create files in arbitrary locations.
Published: 2026-03-21
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Directory Traversal
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a path traversal that allows attackers to write files outside the intended workspace by creating symbolic links inside the workspace that point to non‑existent targets outside the root. This bypasses the boundary checks and results in arbitrary file creation, potentially allowing code execution or data exfiltration. It represents a typical directory traversal weakness (CWE‑22).

Affected Systems

Users running OpenClaw versions older than 2026.2.26 are affected. The issue exists in the open source OpenClaw GitHub project. No specific sub‑versions beyond the cutoff are listed. This includes any deployment of OpenClaw installed via node.js distribution matching the cpe string 2.3:a:openclaw:openclaw.

Risk and Exploitability

The CVSS score of 7.2 indicates moderate‑to‑high severity, and the lack of an EPSS score means we cannot gauge current exploitation prevalence. The vulnerability is not listed in the CISA KEV catalog. The attack likely requires the ability to create or edit workspace files or symlinks, which may be achieved via the application's API or local file operations. Once exploited, the attacker can create files outside the workspace, enabling arbitrary code execution or privilege escalation if the file contents are later processed by the system.

Generated by OpenCVE AI on March 21, 2026 at 06:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.2.26 or later.
  • Verify that workspace boundary checks correctly reject symlinks pointing to non‑existent out‑of‑root targets.
  • If an upgrade is not immediately possible, limit permissions on workspace directories so that only authorized processes can create or modify files there.
  • Monitor logs for anomalous file creation outside expected directories.

Generated by OpenCVE AI on March 21, 2026 at 06:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mgrq-9f93-wpp5 OpenClaw: workspace path guard bypass on non-existent out-of-root symlink leaf
History

Tue, 24 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.2.26 contain a path traversal vulnerability in workspace boundary validation that allows attackers to write files outside the workspace through in-workspace symlinks pointing to non-existent out-of-root targets. The vulnerability exists because the boundary check improperly resolves aliases, permitting the first write operation to escape the workspace boundary and create files in arbitrary locations.
Title OpenClaw < 2026.2.26 - Workspace Path Boundary Bypass via Non-existent Symlink
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-22
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L'}

cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-24T15:21:07.820Z

Reserved: 2026-03-10T19:48:47.516Z

Link: CVE-2026-32055

cve-icon Vulnrichment

Updated: 2026-03-24T15:21:00.617Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-21T01:17:08.903

Modified: 2026-03-23T16:22:12.563

Link: CVE-2026-32055

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:44:14Z

Weaknesses