CVE-2026-28462

HIGH

OpenClaw <2026.2.13 - Path Traversal

Title source: llm
STIX 2.1

Description

OpenClaw versions prior to 2026.2.13 contain a vulnerability in the browser control API in which it accepts user-supplied output paths for trace and download files without consistently constraining writes to temporary directories. Attackers with API access can exploit path traversal in POST /trace/stop, POST /wait/download, and POST /download endpoints to write files outside intended temp roots.

Scores

CVSS v3 7.5
EPSS 0.0007
EPSS Percentile 20.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-22
Status published
Products (2)
npm/openclaw 0 - 2026.2.13npm
openclaw/openclaw < 2026.2.13
Published Mar 05, 2026
Tracked Since Mar 06, 2026