Untriaged
Permalink
CVE-2026-22180
5.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
OpenClaw < 2026.3.2 - Path Confinement Bypass in Browser Output and File Write Operations
OpenClaw versions prior to 2026.3.2 contain a path-confinement bypass vulnerability in browser output handling that allows writes outside intended root directories. Attackers can exploit insufficient canonical path-boundary validation in file write operations to escape root-bound restrictions and write files to arbitrary locations.
References
- GitHub Security Advisory (GHSA-3pxq-f3cp-jmxp) third-party-advisory
- Patch Commit patch
- VulnCheck Advisory: OpenClaw < 2026.3.2 - Path Confinement Bypass in Browser Output and File Write Operations third-party-advisory
Affected products
OpenClaw
- <2026.3.2
- ==2026.3.2
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>