Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.5

OpenClaw allows unauthorized files to be written outside intended area

GHSA-mj4p-rc52-m843
Summary

A security issue in OpenClaw allows an attacker to write files in a location outside the intended area where they should be stored. This could potentially allow unauthorized data to be written to the system. To fix this, update to OpenClaw version 2026.3.11 or later.

What to do
  • Update openclaw to version 2026.3.11.
Affected software
VendorProductAffected versionsFix available
– openclaw <= 2026.3.11 2026.3.11
Original title
OpenClaw: Sandbox staged writes could escape the verified parent directory before commit
Original description
## Summary
In affected versions of `openclaw`, sandbox fs-bridge writes validated the destination before commit, but temporary file creation and population were not pinned to a verified parent directory. A raced parent-path alias change could cause the staged temp file to be created outside the intended writable mount before the final guarded replace step.

## Impact
This is a sandbox boundary bypass affecting integrity and availability within the writable mount scope. Attacker-controlled bytes could be written outside the intended validated path before the final guarded step ran.

## Affected Packages and Versions
- Package: `openclaw` (npm)
- Affected versions: `<= 2026.3.8`
- Fixed in: `2026.3.11`

## Technical Details
The older staging flow created and wrote the temporary file using target-directory shell path operations before the final replace step revalidated the destination. That meant the last guard protected only the final rename, not the earlier temp-file materialization path.

## Fix
OpenClaw now resolves a pinned mount root plus relative parent path, creates the temporary file inside the verified parent directory, and performs the final atomic replace from that pinned directory context. The fix shipped in `[email protected]`.

## Workarounds
Upgrade to `2026.3.11` or later.
ghsa CVSS3.1 7.5
Vulnerability type
CWE-59 Link Following
CWE-367
Published: 13 Mar 2026 · Updated: 14 Mar 2026 · First seen: 13 Mar 2026