Description
OpenClaw versions prior to 2026.2.13 contain a vulnerability in the browser control API in which it accepts user-supplied output paths for trace and download files without consistently constraining writes to temporary directories. Attackers with API access can exploit path traversal in POST /trace/stop, POST /wait/download, and POST /download endpoints to write files outside intended temp roots.
References (3)
Core 3
Core References
Vendor Advisory vendor-advisory
https://github.com/openclaw/openclaw/security/advisories/GHSA-gq9c-wg68-gwj2
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/openclaw-path-traversal-in-trace-and-download-output-paths
Scores
CVSS v3
7.5
EPSS
0.0007
EPSS Percentile
20.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (2)
npm/openclaw
0 - 2026.2.13npm
openclaw/openclaw
< 2026.2.13
Published
Mar 05, 2026
Tracked Since
Mar 06, 2026