Untriaged
Permalink
CVE-2026-32054
6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
OpenClaw < 2026.2.25 - Symlink Traversal in Browser Trace/Download Path Handling
OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in browser trace and download output path handling that allows local attackers to escape the managed temp root directory. An attacker with local access can create symlinks to route file writes outside the intended temp directory, enabling arbitrary file overwrite on the affected system.
References
- GitHub Security Advisory (GHSA-36h3-7c54-j27r) third-party-advisory
- Patch Commit patch
- VulnCheck Advisory: OpenClaw < 2026.2.25 - Symlink Traversal in Browser Trace/Download Path Handling third-party-advisory
Affected products
OpenClaw
- <2026.2.25
- ==2026.2.25
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>