OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted files to access arbitrary host files within gateway process permissions, potentially enabling code execution through file overwrite attacks.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/commit/125f4071bcbc0de32e769940d07967db47f09d3d | Patch |
| https://github.com/openclaw/openclaw/security/advisories/GHSA-fgvx-58p6-gjwc | Mitigation Vendor Advisory |
| https://www.vulncheck.com/advisories/openclaw-symlink-traversal-in-agents-files-methods | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-19 22:16
Updated : 2026-03-23 18:29
NVD link : CVE-2026-32013
Mitre link : CVE-2026-32013
CVE.ORG link : CVE-2026-32013
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
