OpenClaw before 2026.3.8 contains a path traversal vulnerability in the skills download installer that validates the tools root lexically but reuses the mutable path during archive download and copy operations. A local attacker can rebind the tools-root path between validation and final write to redirect the installer outside the intended tools directory.
https://github.com/openclaw/openclaw/security/advisories/GHSA-vhwf-4x96-vqx2
https://github.com/openclaw/openclaw/commit/9abf014f3502009faf9c73df5ca2cff719e54639
Published: 2026-03-29
Updated: 2026-03-29
Base Score: 4.9
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N
Severity: Medium
Base Score: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity: Medium
Base Score: 5.8
Vector: CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
Severity: Medium