Dismissed
by @mweinelt Activity log
- Created automatic suggestion
- @mweinelt dismissed
OpenClaw < 2026.2.12 - Path Traversal via Unsanitized sessionId and sessionFile Parameters
OpenClaw versions prior to 2026.2.12 construct transcript file paths using unsanitized sessionId parameters and sessionFile paths without enforcing directory containment. Authenticated attackers can exploit path traversal sequences like ../../etc/passwd in sessionId or sessionFile parameters to read or write arbitrary files outside the agent sessions directory.
References
-
GitHub Security Advisory (GHSA-5xfq-5mr7-426q) vendor-advisory
-
Patch Commit patch
-
Hardening Commit patch
Affected products
OpenClaw
- <2026.2.12
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>