OpenClaw before 2026.2.17 creates session transcript JSONL files with overly broad default permissions, allowing local users to read transcript contents. Attackers with local access can read transcript files to extract sensitive information including secrets from tool output.
References
Configurations
History
31 Mar 2026, 17:37
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
|
| References | () https://github.com/openclaw/openclaw/commit/095d522099653367e1b76fa5bb09d4ddf7c8a57c - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-vr7j-g7jv-h5mp - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-insufficient-file-permissions-in-session-transcript-files - Third Party Advisory |
29 Mar 2026, 13:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-29 13:17
Updated : 2026-03-31 17:37
NVD link : CVE-2026-33572
Mitre link : CVE-2026-33572
CVE.ORG link : CVE-2026-33572
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-378
Creation of Temporary File With Insecure Permissions
