OpenClaw before 2026.4.22 contains a time-of-check/time-of-use race condition in OpenShell sandbox filesystem writes that allows attackers to redirect writes outside the intended mount root. Attackers can exploit symlink swaps during filesystem operations to bypass sandbox restrictions and write files outside the local mount root.
https://github.com/openclaw/openclaw/security/advisories/GHSA-wppj-c6mr-83jj
https://github.com/openclaw/openclaw/commit/7be82d4fd1193bcb7e44ee38838f00bf924ffa76
Published: 2026-05-06
Updated: 2026-05-06
Base Score: 4.9
Vector: CVSS2#AV:N/AC:H/Au:S/C:N/I:C/A:N
Severity: Medium
Base Score: 5.3
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
Severity: Medium
Base Score: 6
Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Severity: Medium