Impact
This vulnerability allows a local attacker to perform a path traversal in the skills download installer. The installer validates the tools‑root path only lexically, but the mutable path is reused later when downloading and copying the archive. An attacker can rebind the tools‑root between validation and the final write, causing the installer to write files outside the intended tools directory. This direct write to an arbitrary location can result in configuration tampering or execution of malicious code, as the attacker controls which files are written. The issue is identified as CWE‑367.
Affected Systems
The flaw affects the OpenClaw application whenever the installed version is older than 2026.3.8. All product instances before this release, irrespective of the operating system or deployment environment, are vulnerable. Users running earlier versions should consult the vendor’s announcement for the list of affected builds.
Risk and Exploitability
This vulnerability has a CVSS base score of 5.8, indicating a moderate risk. The exploit likelihood is currently unknown due to the absence of EPSS data, but the vulnerability is limited to local systems, requiring the attacker to already have some level of local access. It is not yet listed in the CISA KEV catalog. Attesting that the vulnerability can be exploited locally remains the main risk factor.
OpenCVE Enrichment
Github GHSA