Impact
The flaw resides in OpenClaw’s mirror mode where an attacker can influence the configuration values remoteWorkspaceDir and remoteAgentWorkspaceDir. By supplying malicious values in the OpenShell config, the mirror sync operation can delete arbitrary remote directories and overwrite the contents with data from the attacker's local workspace. This leads to loss of remote data and potential data integrity compromise.
Affected Systems
Versions of OpenClaw earlier than 2026.4.2 are vulnerable. The issue is present in all deployments of the OpenClaw product that use the mirror mode feature, regardless of operating system, as long as remote configuration paths are not properly constrained.
Risk and Exploitability
The reported CVSS score of 6.1 indicates a moderate severity. No EPSS score is available, and the vulnerability is not listed in CISA’s KEV catalog. Attackers would need to gain the ability to modify the configuration for the target instance, which is typically possible if remote configuration management is exposed or if the attacker can upload configuration files. Once the configuration is altered, the deletion can occur during normal mirror sync operations without additional privileges.
OpenCVE Enrichment