Description
OpenClaw versions prior to 2026.2.12 construct transcript file paths using unsanitized sessionId parameters and sessionFile paths without enforcing directory containment. Authenticated attackers can exploit path traversal sequences like ../../etc/passwd in sessionId or sessionFile parameters to read or write arbitrary files outside the agent sessions directory.
Problem types
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Any version before 2026.2.12
Credits
AM (@akhmittra)
References
github.com/...enclaw/security/advisories/GHSA-5xfq-5mr7-426q (GitHub Security Advisory (GHSA-5xfq-5mr7-426q))
github.com/...ommit/4199f9889f0c307b77096a229b9e085b8d856c26 (Patch Commit)
github.com/...ommit/cab0abf52ac91e12ea7a0cf04fff315cf0c94d64 (Hardening Commit)
www.vulncheck.com/...ed-sessionid-and-sessionfile-parameters (VulnCheck Advisory: OpenClaw < 2026.2.12 - Path Traversal via Unsanitized sessionId and sessionFile Parameters)