Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.1
OpenClaw Prior to 2026.2.12: Unvalidated Session File Path
CVE-2026-28459
GHSA-64qx-vpxx-mvqf
Summary
Authenticated users can write files to arbitrary locations on the system, potentially causing configuration issues or service disruptions. This affects OpenClaw versions prior to 2026.2.12. Users should update to the latest version to prevent unauthorized file access.
What to do
- Update steipete openclaw to version 2026.2.12.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| steipete | openclaw | <= 2026.2.12 | 2026.2.12 |
| openclaw | openclaw | <= 2026.2.12 | – |
Original title
OpenClaw versions prior to 2026.2.12 fail to validate the sessionFile path parameter, allowing authenticated gateway clients to write transcript data to arbitrary locations on the host filesystem. ...
Original description
OpenClaw versions prior to 2026.2.12 fail to validate the sessionFile path parameter, allowing authenticated gateway clients to write transcript data to arbitrary locations on the host filesystem. Attackers can supply a sessionFile path outside the sessions directory to create files and append data repeatedly, potentially causing configuration corruption or denial of service.
nvd CVSS3.1
7.1
nvd CVSS4.0
7.1
Vulnerability type
CWE-73
CWE-23
CWE-78
OS Command Injection
CWE-284
Improper Access Control
- https://github.com/openclaw/openclaw/commit/25950bcbb8ba4d8cde002557f6e27c219ae4...
- https://github.com/openclaw/openclaw/commit/4199f9889f0c307b77096a229b9e085b8d85...
- https://github.com/openclaw/openclaw/security/advisories/GHSA-64qx-vpxx-mvqf
- https://www.vulncheck.com/advisories/openclaw-arbitrary-file-write-via-untrusted...
- https://github.com/openclaw/openclaw/releases/tag/v2026.2.12
- https://nvd.nist.gov/vuln/detail/CVE-2026-28459
- https://github.com/advisories/GHSA-64qx-vpxx-mvqf
Published: 5 Mar 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026