CVE-2026-32013 PUBLISHED

OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods

Assigner: VulnCheck
Reserved: 10.03.2026 Published: 19.03.2026 Updated: 19.03.2026

OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted files to access arbitrary host files within gateway process permissions, potentially enabling code execution through file overwrite attacks.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.2.25 (excl.)
  • Version 2026.2.25 is unaffected

Credits

  • tdjackey reporter

References

Problem Types

  • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE