8.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @pyrox0 Activity log
- Created suggestion
- @pyrox0 dismissed
OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods
OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted files to access arbitrary host files within gateway process permissions, potentially enabling code execution through file overwrite attacks.
References
-
GitHub Security Advisory (GHSA-fgvx-58p6-gjwc) third-party-advisory
-
Patch Commit patch
-
VulnCheck Advisory: OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods third-party-advisory
Affected products
- ==2026.2.25
- <2026.2.25
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>