CVE-2026-32013

critical

Description

OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted files to access arbitrary host files within gateway process permissions, potentially enabling code execution through file overwrite attacks.

References

https://www.vulncheck.com/advisories/openclaw-symlink-traversal-in-agents-files-methods

https://github.com/openclaw/openclaw/security/advisories/GHSA-fgvx-58p6-gjwc

https://github.com/openclaw/openclaw/commit/125f4071bcbc0de32e769940d07967db47f09d3d

Details

Source: Mitre, NVD

Published: 2026-03-19

Updated: 2026-03-23

Risk Information

CVSS v2

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High

CVSS v4

Base Score: 9.3

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Severity: Critical

EPSS

EPSS: 0.00056