Description
OpenClaw before 2026.4.22 contains a time-of-check/time-of-use race condition in the OpenShell filesystem bridge that allows attackers to read files outside the intended mount root. Attackers can exploit symlink swaps during filesystem operations to bypass sandbox restrictions and access unauthorized file contents.
Published: 2026-05-06
Score: 6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A time‑of‑check/time‑of‑use race condition in the OpenClaw OpenShell filesystem bridge permits an attacker to read files outside the permitted mount root. The flaw arises when a symlink can be swapped between the check that authorizes the file read and the use of that reference, thereby bypassing sandbox restrictions and exposing sensitive file contents. This vulnerability is a classic example of malicious symlink manipulation documented by CWE‑367, which compromises confidentiality for any data accessed beyond the intended directory scope.

Affected Systems

The issue affects all installations of OpenClaw prior to the 2026.4.22 release. The affected product is OpenClaw, built on Node.js, and any deployment that utilizes the OpenShell filesystem bridge component before the patched version is at risk.

Risk and Exploitability

The CVSS score of 6 indicates a moderate severity vulnerability. EPSS data is unavailable, and the vulnerability is not listed in the CISA KEV catalog, implying no confirmed exploit in the wild yet. The attack likely requires the ability to influence or supply files to the target system to orchestrate the symlink swap, which may require local or privileged access. Nonetheless, the potential to read arbitrary files underscores the risk to confidentiality if the attacker can leverage the OpenShell bridge component.

Generated by OpenCVE AI on May 6, 2026 at 21:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.4.22 or later
  • If upgrading is delayed, disable the OpenShell filesystem bridge or limit its use to trusted contexts
  • Apply strict filesystem permissions or chroot environments to prevent symlink manipulation and ensure file access is confined to designated directories

Generated by OpenCVE AI on May 6, 2026 at 21:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.4.22 contains a time-of-check/time-of-use race condition in the OpenShell filesystem bridge that allows attackers to read files outside the intended mount root. Attackers can exploit symlink swaps during filesystem operations to bypass sandbox restrictions and access unauthorized file contents.
Title OpenClaw < 2026.4.22 - Time-of-Check/Time-of-Use Race Condition in OpenShell FS Bridge
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-367
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-06T19:49:30.325Z

Reserved: 2026-05-05T11:30:46.259Z

Link: CVE-2026-44113

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T20:16:35.207

Modified: 2026-05-06T21:20:52.707

Link: CVE-2026-44113

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T22:15:13Z

Weaknesses