Home

Description

OpenClaw versions prior to 2026.3.2 contain a vulnerability in the stageSandboxMedia function in which it fails to validate destination symlinks during media staging, allowing writes to follow symlinks outside the sandbox workspace. Attackers can exploit this by placing symlinks in the media/inbound directory to overwrite arbitrary files on the host system outside sandbox boundaries.

PUBLISHED Reserved 2026-03-10 | Published 2026-03-19 | Updated 2026-03-19 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N

MEDIUM: 6.1CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L

Problem types

CWE-59: Improper Link Resolution Before File Access ('Link Following')

Product status

Default status
unaffected

Any version before 2026.3.2
affected

Credits

tdjackey reporter

References

github.com/...enclaw/security/advisories/GHSA-cfvj-7rx7-fc7c (GitHub Security Advisory (GHSA-cfvj-7rx7-fc7c)) third-party-advisory

github.com/...ommit/17ede52a4be3034f6ec4b883ac6b81ad0101558a (Patch Commit) patch

www.vulncheck.com/...versal-in-stagesandboxmedia-destination (VulnCheck Advisory: OpenClaw < 2026.3.2 - Symlink Traversal in stageSandboxMedia Destination) third-party-advisory

cve.org (CVE-2026-31990)

nvd.nist.gov (CVE-2026-31990)

Download JSON