OpenClaw versions prior to 2026.3.2 contain a vulnerability in the stageSandboxMedia function in which it fails to validate destination symlinks during media staging, allowing writes to follow symlinks outside the sandbox workspace. Attackers can exploit this by placing symlinks in the media/inbound directory to overwrite arbitrary files on the host system outside sandbox boundaries.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/commit/17ede52a4be3034f6ec4b883ac6b81ad0101558a | Patch |
| https://github.com/openclaw/openclaw/security/advisories/GHSA-cfvj-7rx7-fc7c | Mitigation Vendor Advisory |
| https://www.vulncheck.com/advisories/openclaw-symlink-traversal-in-stagesandboxmedia-destination | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-19 02:16
Updated : 2026-03-19 19:16
NVD link : CVE-2026-31990
Mitre link : CVE-2026-31990
CVE.ORG link : CVE-2026-31990
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
