Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.8

OpenClaw: Malicious File Overwrite in Browser Download Paths

GHSA-36h3-7c54-j27r
Summary

OpenClaw's handling of browser download paths allows an attacker to write files outside the intended temporary directory, potentially overwriting arbitrary files. This could lead to malicious data being written to the system. Update to the latest version of OpenClaw (2026.2.25) to fix this issue.

What to do
  • Update openclaw to version 2026.2.25.
Affected software
VendorProductAffected versionsFix available
– openclaw <= 2026.2.25 2026.2.25
Original title
OpenClaw has browser trace/download path symlink escape in temp output handling
Original description
### Summary
Browser trace/download output path handling allowed symlink-root and symlink-parent escapes from the managed temp root.

### Affected Packages / Versions
- Package: `openclaw` (npm)
- Latest published npm version: `2026.2.24`
- Affected versions: `<= 2026.2.24`
- Planned patched release: `2026.2.25`

### Impact
An attacker with relevant local foothold and ability to influence output paths could route writes outside the intended temp root via symlink traversal, leading to arbitrary file overwrite.

### Fix Commit(s)
- `496a76c03ba85e15ea715e5a583e498ae04d36e3`

### Release Process Note
`patched_versions` is pre-set to the release (`2026.2.25`) so once npm `2026.2.25` is published, the advisory is published.

OpenClaw thanks @tdjackey for reporting.
ghsa CVSS4.0 6.8
Vulnerability type
CWE-22 Path Traversal
CWE-59 Link Following
Published: 2 Mar 2026 · Updated: 7 Mar 2026 · First seen: 6 Mar 2026