CVE-2026-32054 PUBLISHED

OpenClaw < 2026.2.25 - Symlink Traversal in Browser Trace/Download Path Handling

Assigner: VulnCheck
Reserved: 10.03.2026 Published: 21.03.2026 Updated: 21.03.2026

OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in browser trace and download output path handling that allows local attackers to escape the managed temp root directory. An attacker with local access can create symlinks to route file writes outside the intended temp directory, enabling arbitrary file overwrite on the affected system.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 5.9

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.2.25 (excl.)
  • Version 2026.2.25 is unaffected

Credits

  • tdjackey reporter

References

Problem Types

  • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE