CVE-2026-28482

HIGH

OpenClaw <2026.2.12 - Path Traversal

Title source: llm
STIX 2.1

Description

OpenClaw versions prior to 2026.2.12 construct transcript file paths using unsanitized sessionId parameters and sessionFile paths without enforcing directory containment. Authenticated attackers can exploit path traversal sequences like ../../etc/passwd in sessionId or sessionFile parameters to read or write arbitrary files outside the agent sessions directory.

Scores

CVSS v3 7.1
EPSS 0.0004
EPSS Percentile 10.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-22
Status published
Products (2)
npm/openclaw 0 - 2026.2.12npm
openclaw/openclaw < 2026.2.12
Published Mar 05, 2026
Tracked Since Mar 06, 2026