Impact
The vulnerability is a time‑of‑check to time‑of‑use race condition in the validateScriptFileForShellBleed function of OpenClaw, which allows a local user with workspace write privileges to race‑condition swap the target file between validation and preflight read, causing the validator to inspect a different file after the initial boundary check. This bypasses the tool’s workspace boundary checks and may enable unauthorized access or execution of files outside the intended workspace. The likely attack vector is local and requires write access within the workspace.
Affected Systems
OpenClaw versions earlier than 2026.4.10 are affected. The product is the OpenClaw application, distributed as a Node.js package.
Risk and Exploitability
The CVSS score of 2.0 indicates a low severity vulnerability, and no EPSS data is available, so the likelihood of widespread exploitation is currently low. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires local write access to a workspace, allowing a user to race‑condition the target script file between validation and its preflight read. A successful attack can bypass workspace boundaries, leading to unauthorized file access or execution within the workspace context.
OpenCVE Enrichment
Github GHSA