CVE-2026-41296

OpenClaw before 2026.3.31 contains a time-of-check-time-of-use race condition in the remote filesystem bridge readFile function that allows sandbox escape. Attackers can exploit the separate path validation and file read operations to bypass sandbox restrictions and read arbitrary files.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

27 Apr 2026, 15:06

Type Values Removed Values Added
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
References () https://github.com/openclaw/openclaw/commit/121870a08583033ed6a0ed73d9ffea32991252bb - () https://github.com/openclaw/openclaw/commit/121870a08583033ed6a0ed73d9ffea32991252bb - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-9p3r-hh9g-5cmg - () https://github.com/openclaw/openclaw/security/advisories/GHSA-9p3r-hh9g-5cmg - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-sandbox-escape-via-toctou-race-in-remote-fs-bridge-readfile - () https://www.vulncheck.com/advisories/openclaw-sandbox-escape-via-toctou-race-in-remote-fs-bridge-readfile - Third Party Advisory
First Time Openclaw openclaw
Openclaw

21 Apr 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-21 00:16

Updated : 2026-04-27 15:06


NVD link : CVE-2026-41296

Mitre link : CVE-2026-41296

CVE.ORG link : CVE-2026-41296


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition