Description
OpenClaw before 2026.4.22 contains a time-of-check/time-of-use race condition in OpenShell sandbox filesystem writes that allows attackers to redirect writes outside the intended mount root. Attackers can exploit symlink swaps during filesystem operations to bypass sandbox restrictions and write files outside the local mount root.
Problem types
CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
Product status
Any version before 2026.4.22
2026.4.22 (semver)
Credits
vladimir tokarev (@VladimirEliTokarev)
References
github.com/...enclaw/security/advisories/GHSA-wppj-c6mr-83jj (GitHub Security Advisory (GHSA-wppj-c6mr-83jj))
github.com/...ommit/7be82d4fd1193bcb7e44ee38838f00bf924ffa76 (Patch Commit)
www.vulncheck.com/...condition-in-openshell-fs-bridge-writes (VulnCheck Advisory: OpenClaw < 2026.4.22 - Symlink Swap Race Condition in OpenShell FS Bridge Writes)