OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files. Attackers can exploit this by uploading tar archives containing symlinks to escape the sandbox and overwrite files on the remote host.
References
Configurations
History
28 Apr 2026, 18:45
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
|
| References | () https://github.com/openclaw/openclaw/commit/3d5af14984ac1976c747a8e11581d697bd0829dc - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-fv94-qvg8-xqpw - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-arbitrary-file-write-via-symlink-following-in-ssh-sandbox-tar-upload - Third Party Advisory |
28 Apr 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-28 00:16
Updated : 2026-04-28 18:45
NVD link : CVE-2026-41364
Mitre link : CVE-2026-41364
CVE.ORG link : CVE-2026-41364
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
