OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted files to access arbitrary host files within gateway process permissions, potentially enabling code execution through file overwrite attacks.
https://www.vulncheck.com/advisories/openclaw-symlink-traversal-in-agents-files-methods
https://github.com/openclaw/openclaw/security/advisories/GHSA-fgvx-58p6-gjwc
https://github.com/openclaw/openclaw/commit/125f4071bcbc0de32e769940d07967db47f09d3d
Published: 2026-03-19
Updated: 2026-03-23
Base Score: 9
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
Severity: High
Base Score: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: High
Base Score: 9.3
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Severity: Critical
EPSS: 0.00056