OpenClaw before 2026.3.31 contains a time-of-check-time-of-use race condition in the remote filesystem bridge readFile function that allows sandbox escape. Attackers can exploit the separate path validation and file read operations to bypass sandbox restrictions and read arbitrary files.
References
Configurations
History
27 Apr 2026, 15:06
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/openclaw/openclaw/commit/121870a08583033ed6a0ed73d9ffea32991252bb - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-9p3r-hh9g-5cmg - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-sandbox-escape-via-toctou-race-in-remote-fs-bridge-readfile - Third Party Advisory | |
| First Time |
Openclaw openclaw
Openclaw |
21 Apr 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-21 00:16
Updated : 2026-04-27 15:06
NVD link : CVE-2026-41296
Mitre link : CVE-2026-41296
CVE.ORG link : CVE-2026-41296
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
