Impact
OpenClaw versions older than 2026.2.17 generate session transcript JSONL files with overly permissive default permissions. The files can be read by any local user, exposing sensitive data that the tool outputs, such as secret tokens or credentials. This is an example of insufficient file permissions (CWE‑378) that directly leads to privacy and integrity compromise.
Affected Systems
The vulnerability affects installations of OpenClaw running any release prior to 2026.2.17. All users that can access the host where the tool runs are at risk when session transcripts are produced.
Risk and Exploitability
With a CVSS score of 6.8 the severity is moderate and no EPSS data or KEV listing is available. The attack vector is local; any user with a local account that can execute OpenClaw and cause it to produce a transcript can read the resulting file because the file permissions allow wide access. The risk of exploitation is significant in multi‑user or shared environments where attackers can obtain the host or use a compromised local account.
OpenCVE Enrichment
Github GHSA