OpenClaw versions prior to 2026.3.2 contain a race condition vulnerability in ZIP extraction that allows local attackers to write files outside the intended destination directory. Attackers can exploit a time-of-check-time-of-use race between path validation and file write operations by rebinding parent directory symlinks to redirect writes outside the extraction root.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/commit/7dac9b05dd9d38dd3929637f26fa356fd8bdd107 | Patch |
| https://github.com/openclaw/openclaw/security/advisories/GHSA-r54r-wmmq-mh84 | Mitigation Vendor Advisory |
| https://www.vulncheck.com/advisories/openclaw-arbitrary-file-write-via-zip-extraction-parent-symlink-race-condition | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-19 02:16
Updated : 2026-03-19 19:18
NVD link : CVE-2026-27670
Mitre link : CVE-2026-27670
CVE.ORG link : CVE-2026-27670
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
