Description
OpenClaw before 2026.3.31 contains a sandbox escape vulnerability allowing attackers to traverse directory boundaries through symlink exploitation during file synchronization operations. Remote attackers can bypass sandbox restrictions by crafting malicious symlinks in mirror sync operations to access arbitrary files outside intended boundaries.
Problem types
CWE-59: Improper Link Resolution Before File Access ('Link Following')
Product status
Any version before 2026.3.31
2026.3.31 (semver)
Credits
AntAISecurityLab
References
github.com/...enclaw/security/advisories/GHSA-cwf8-44x6-32c2 (GitHub Security Advisory (GHSA-cwf8-44x6-32c2))
github.com/...ommit/c02ee8a3a4cb390b23afdf21317aa8b2096854d1 (Patch Commit)
github.com/...ommit/3b9dab0ece4643a9643e6a45459f5c709d3ce320 (Patch Commit)
www.vulncheck.com/...tricted-file-sync-and-symlink-traversal (VulnCheck Advisory: OpenClaw < 2026.3.31 - Sandbox Escape via Unrestricted File Sync and Symlink Traversal)