Untriaged
Permalink
CVE-2026-32988
7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
OpenClaw < 2026.3.11 - Sandbox Boundary Bypass via Unvalidated Temporary File Creation
OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability in fs-bridge staged writes where temporary file creation and population are not pinned to a verified parent directory. Attackers can exploit a race condition in parent-path alias changes to write attacker-controlled bytes outside the intended validated path before the final guarded replace step executes.
References
-
GitHub Security Advisory (GHSA-mj4p-rc52-m843) third-party-advisory
Affected products
OpenClaw
- <2026.3.11
- ==2026.3.11
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>