CVE-2026-33572

OpenClaw before 2026.2.17 creates session transcript JSONL files with overly broad default permissions, allowing local users to read transcript contents. Attackers with local access can read transcript files to extract sensitive information including secrets from tool output.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

31 Mar 2026, 17:37

Type Values Removed Values Added
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw
References () https://github.com/openclaw/openclaw/commit/095d522099653367e1b76fa5bb09d4ddf7c8a57c - () https://github.com/openclaw/openclaw/commit/095d522099653367e1b76fa5bb09d4ddf7c8a57c - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-vr7j-g7jv-h5mp - () https://github.com/openclaw/openclaw/security/advisories/GHSA-vr7j-g7jv-h5mp - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-insufficient-file-permissions-in-session-transcript-files - () https://www.vulncheck.com/advisories/openclaw-insufficient-file-permissions-in-session-transcript-files - Third Party Advisory

29 Mar 2026, 13:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-29 13:17

Updated : 2026-03-31 17:37


NVD link : CVE-2026-33572

Mitre link : CVE-2026-33572

CVE.ORG link : CVE-2026-33572


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-378

Creation of Temporary File With Insecure Permissions