Description
OpenClaw versions prior to 2026.3.2 contain a vulnerability in the stageSandboxMedia function in which it fails to validate destination symlinks during media staging, allowing writes to follow symlinks outside the sandbox workspace. Attackers can exploit this by placing symlinks in the media/inbound directory to overwrite arbitrary files on the host system outside sandbox boundaries.
Problem types
CWE-59: Improper Link Resolution Before File Access ('Link Following')
Product status
Any version before 2026.3.2
Credits
tdjackey
References
github.com/...enclaw/security/advisories/GHSA-cfvj-7rx7-fc7c (GitHub Security Advisory (GHSA-cfvj-7rx7-fc7c))
github.com/...ommit/17ede52a4be3034f6ec4b883ac6b81ad0101558a (Patch Commit)
www.vulncheck.com/...versal-in-stagesandboxmedia-destination (VulnCheck Advisory: OpenClaw < 2026.3.2 - Symlink Traversal in stageSandboxMedia Destination)