OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in sandbox skill mirroring (must be enabled) that uses the skill frontmatter name parameter unsanitized when copying skills into the sandbox workspace. Attackers who provide a crafted skill package with traversal sequences like ../ or absolute paths in the name field can write files outside the sandbox workspace root directory.
https://github.com/openclaw/openclaw/security/advisories/GHSA-xw4p-pw82-hqr7
https://github.com/openclaw/openclaw/commit/3eb6a31b6fcf8268456988bfa8e3637d373438c2
Published: 2026-03-05
Updated: 2026-03-05
Base Score: 4.7
Vector: CVSS2#AV:L/AC:H/Au:N/C:N/I:C/A:P
Severity: Medium
Base Score: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L
Severity: High
Base Score: 5.7
Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
Severity: Medium