Description
OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in sandbox skill mirroring (must be enabled) that uses the skill frontmatter name parameter unsanitized when copying skills into the sandbox workspace. Attackers who provide a crafted skill package with traversal sequences like ../ or absolute paths in the name field can write files outside the sandbox workspace root directory.
References (3)
Core 3
Core References
Vendor Advisory vendor-advisory
https://github.com/openclaw/openclaw/security/advisories/GHSA-xw4p-pw82-hqr7
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/openclaw-path-traversal-in-sandbox-skill-mirroring-via-name-parameter
Scores
CVSS v3
6.1
EPSS
0.0004
EPSS Percentile
12.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (2)
npm/openclaw
0 - 2026.2.14npm
openclaw/openclaw
< 2026.2.14
Published
Mar 05, 2026
Tracked Since
Mar 06, 2026