CVE-2026-32054

OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in browser trace and download output path handling that allows local attackers to escape the managed temp root directory. An attacker with local access can create symlinks to route file writes outside the intended temp directory, enabling arbitrary file overwrite on the affected system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

24 Mar 2026, 21:11

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/commit/496a76c03ba85e15ea715e5a583e498ae04d36e3 - () https://github.com/openclaw/openclaw/commit/496a76c03ba85e15ea715e5a583e498ae04d36e3 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-36h3-7c54-j27r - () https://github.com/openclaw/openclaw/security/advisories/GHSA-36h3-7c54-j27r - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-symlink-traversal-in-browser-trace-download-path-handling - () https://www.vulncheck.com/advisories/openclaw-symlink-traversal-in-browser-trace-download-path-handling - Third Party Advisory
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw

21 Mar 2026, 01:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-21 01:17

Updated : 2026-03-24 21:11


NVD link : CVE-2026-32054

Mitre link : CVE-2026-32054

CVE.ORG link : CVE-2026-32054


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')