OpenClaw before 2026.3.8 contains a path traversal vulnerability in the skills download installer that validates the tools root lexically but reuses the mutable path during archive download and copy operations. A local attacker can rebind the tools-root path between validation and final write to redirect the installer outside the intended tools directory.
https://github.com/openclaw/openclaw/security/advisories/GHSA-vhwf-4x96-vqx2
https://github.com/openclaw/openclaw/commit/9abf014f3502009faf9c73df5ca2cff719e54639
Published: 2026-03-29
Updated: 2026-03-31
Base Score: 3.8
Vector: CVSS2#AV:L/AC:H/Au:S/C:N/I:C/A:N
Severity: Low
Base Score: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
Severity: Medium
Base Score: 5.8
Vector: CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
Severity: Medium
EPSS: 0.0001