Description
OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files. Attackers can exploit this by uploading tar archives containing symlinks to escape the sandbox and overwrite files on the remote host.
Problem types
CWE-59: Improper Link Resolution Before File Access ('Link Following')
Product status
Any version before 2026.3.31
2026.3.31 (semver)
Credits
AntAISecurityLab
References
github.com/...enclaw/security/advisories/GHSA-fv94-qvg8-xqpw (GitHub Security Advisory (GHSA-fv94-qvg8-xqpw))
github.com/...ommit/3d5af14984ac1976c747a8e11581d697bd0829dc (Patch Commit)
www.vulncheck.com/...ink-following-in-ssh-sandbox-tar-upload (VulnCheck Advisory: OpenClaw < 2026.3.31 - Arbitrary File Write via Symlink Following in SSH Sandbox Tar Upload)