Untriaged
Permalink
CVE-2026-32013
8.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods
OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted files to access arbitrary host files within gateway process permissions, potentially enabling code execution through file overwrite attacks.
References
- GitHub Security Advisory (GHSA-fgvx-58p6-gjwc) third-party-advisory
- Patch Commit patch
- VulnCheck Advisory: OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods third-party-advisory
Affected products
OpenClaw
- ==2026.2.25
- <2026.2.25
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>