Impact
The vulnerability is a path traversal that allows attackers to write files outside the intended workspace by creating symbolic links inside the workspace that point to non‑existent targets outside the root. This bypasses the boundary checks and results in arbitrary file creation, potentially allowing code execution or data exfiltration. It represents a typical directory traversal weakness (CWE‑22).
Affected Systems
Users running OpenClaw versions older than 2026.2.26 are affected. The issue exists in the open source OpenClaw GitHub project. No specific sub‑versions beyond the cutoff are listed. This includes any deployment of OpenClaw installed via node.js distribution matching the cpe string 2.3:a:openclaw:openclaw.
Risk and Exploitability
The CVSS score of 7.2 indicates moderate‑to‑high severity, and the lack of an EPSS score means we cannot gauge current exploitation prevalence. The vulnerability is not listed in the CISA KEV catalog. The attack likely requires the ability to create or edit workspace files or symlinks, which may be achieved via the application's API or local file operations. Once exploited, the attacker can create files outside the workspace, enabling arbitrary code execution or privilege escalation if the file contents are later processed by the system.
OpenCVE Enrichment
Github GHSA