Impact
OpenClaw versions before 2026.3.11 allow attackers to bypass sandbox boundaries by constructing temporary files during staged writes without associating them with a verified parent directory. This race condition lets an adversary write arbitrary data outside the intended, validated path before the final replacement step occurs, potentially enabling the insertion of malicious code or alteration of critical files. The weakness lies in improper handling of temporary file creation, leading to unauthorized file system writes.
Affected Systems
All installations of OpenClaw with a version earlier than 2026.3.11 are vulnerable. The affected software component sits on the Node.js platform, and the flaw exists in the fs-bridge logic that manages file writes within the application’s sandbox.
Risk and Exploitability
With a CVSS score of 5.8, the vulnerability presents a moderate risk. Exploitation requires the attacker to trigger the race condition during the temporary file creation phase, which may be achieved by manipulating input that causes parent-path alias changes. While the advisory does not list it in the CISA KEV catalog and EPSS data is unavailable, the attack path involves local or possibly remote code execution if the sandbox is exposed to untrusted inputs. The risk is therefore significant enough to warrant patching before an exploit is seen in the wild.
OpenCVE Enrichment