CVE-2026-43570
MEDIUMOpenClaw 2026.3.22 < 2026.4.5 - Symlink Traversal in Remote Marketplace Repository Path Handling
Title source: cnaDescription
OpenClaw versions 2026.3.22 before 2026.4.5 contain a symlink traversal vulnerability in remote marketplace repository path handling that allows attackers to escape the expected repository root. Attackers can exploit this by providing crafted symlink paths to access files outside the intended repository directory.
References (4)
Core 4
Core References
Vendor Advisory vendor-advisory
GitHub Security Advisory (GHSA-cr8r-7g2h-6wr6)
https://github.com/openclaw/openclaw/security/advisories/GHSA-cr8r-7g2h-6wr6
Patch patch
Patch Commit (1)
https://github.com/openclaw/openclaw/commit/94b0062e90467e1582b47cc971f308457c537f3a
Patch patch
Patch Commit (2)
https://github.com/openclaw/openclaw/commit/b1dd3ded3589f6fa60ab85b3930a82d538edaeae
Third Party Advisory third-party-advisory
VulnCheck Advisory: OpenClaw 2026.3.22 < 2026.4.5 - Symlink Traversal in Remote Marketplace Repository Path Handling
https://www.vulncheck.com/advisories/openclaw-symlink-traversal-in-remote-marketplace-repository-path-handling
Scores
CVSS v3
6.5
EPSS
0.0004
EPSS Percentile
10.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-61
Status
published
Products (2)
OpenClaw/OpenClaw
2026.3.22 - 2026.4.5
OpenClaw/OpenClaw
2026.4.5
Published
May 05, 2026
Tracked Since
May 05, 2026