Description
OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in sandbox skill mirroring (must be enabled) that uses the skill frontmatter name parameter unsanitized when copying skills into the sandbox workspace. Attackers who provide a crafted skill package with traversal sequences like ../ or absolute paths in the name field can write files outside the sandbox workspace root directory.
Problem types
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Any version before 2026.2.14
Credits
Oleh Konko (@1seal)
References
github.com/...enclaw/security/advisories/GHSA-xw4p-pw82-hqr7 (GitHub Security Advisory (GHSA-xw4p-pw82-hqr7))
github.com/...ommit/3eb6a31b6fcf8268456988bfa8e3637d373438c2 (Patch Commit)
www.vulncheck.com/...dbox-skill-mirroring-via-name-parameter (VulnCheck Advisory: OpenClaw < 2026.2.14 - Path Traversal in Sandbox Skill Mirroring via Name Parameter)