Untriaged
Permalink
CVE-2026-32044
5.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
OpenClaw < 2026.3.2 - Tar Archive Safety Bypass in Skills Installation
OpenClaw versions prior to 2026.3.2 contain an archive extraction vulnerability in the tar.bz2 installer path that bypasses safety checks enforced on other archive formats. Attackers can craft malicious tar.bz2 skill archives to bypass special-entry blocking and extracted-size guardrails, causing local denial of service during skill installation.
References
-
GitHub Security Advisory (GHSA-77hf-7fqf-f227) third-party-advisory
-
Patch Commit patch
Affected products
OpenClaw
- ==2026.3.2
- <2026.3.2
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>