Impact
OpenClaw versions prior to 2026.3.31 are vulnerable to a sandbox escape that permits directory traversal via malicious symbolic links created during file synchronization operations. The flaw allows a remote actor to craft symlinks that bypass the intended boundary checks, exposing sensitive files and potentially allowing modification of system resources. This vulnerability is a direct manifestation of CWE-59, which concerns path traversal and symlink exploitation.
Affected Systems
All installations of OpenClaw prior to the 2026.3.31 release are affected; the vulnerability is present in community and enterprise builds that use the default file sync feature. Users should verify whether they run an earlier release and note that the fix is included in releases 2026.3.31 and later.
Risk and Exploitability
The CVSS score of 7.6 indicates a high risk for remote attackers. Although an EPSS score is not available, the flaw can be exploited by any attacker able to initiate a file sync request, making the likelihood of exploitation relatively high in exposed environments. The vulnerability is not currently listed in the CISA KEV catalog, but the potential for privilege escalation outside the sandbox warrants immediate attention.
OpenCVE Enrichment