Untriaged
Permalink
CVE-2026-28482
6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): NONE
OpenClaw < 2026.2.12 - Path Traversal via Unsanitized sessionId and sessionFile Parameters
OpenClaw versions prior to 2026.2.12 construct transcript file paths using unsanitized sessionId parameters and sessionFile paths without enforcing directory containment. Authenticated attackers can exploit path traversal sequences like ../../etc/passwd in sessionId or sessionFile parameters to read or write arbitrary files outside the agent sessions directory.
References
-
GitHub Security Advisory (GHSA-5xfq-5mr7-426q) vendor-advisory
-
Patch Commit patch
-
Hardening Commit patch
Affected products
OpenClaw
- <2026.2.12
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>