CVE-2026-32054
Received Received - Intake
Symlink Traversal in OpenClaw Enables Arbitrary File Overwrite

Publication date: 2026-03-21

Last updated on: 2026-03-24

Assigner: VulnCheck

Description
OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in browser trace and download output path handling that allows local attackers to escape the managed temp root directory. An attacker with local access can create symlinks to route file writes outside the intended temp directory, enabling arbitrary file overwrite on the affected system.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-21
Last Modified
2026-03-24
Generated
2026-05-07
AI Q&A
2026-03-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.2.25 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-59 The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-32054 is a symlink traversal vulnerability in OpenClaw versions prior to 2026.2.25. It occurs in the handling of browser trace and download output paths, where an attacker with local access can create symbolic links (symlinks) that cause file writes to escape the intended managed temporary root directory.

This means that instead of writing files only within a safe temporary directory, the attacker can redirect these writes to arbitrary locations on the file system by exploiting symlinks, potentially overwriting important files.

The vulnerability stems from insufficient validation of file paths, allowing symlink-root and symlink-parent escapes. The fix involves strict realpath-based checks to ensure all writable paths remain lexically and physically inside the designated root directory, rejecting any paths involving symlinks that lead outside.


How can this vulnerability impact me? :

This vulnerability allows a local attacker with limited privileges to overwrite arbitrary files on the affected system by exploiting symlink traversal in temporary file handling.

  • Arbitrary file overwrite outside the intended temporary directory.
  • Potential compromise of system integrity by modifying critical files.
  • Possible impact on confidentiality, integrity, and availability of the system.
  • Attack complexity is high and requires local access, but no user interaction is needed.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves checking for the presence of symlink traversal attempts in the browser trace and download output paths used by OpenClaw prior to version 2026.2.25.

Since the vulnerability allows local attackers to create symbolic links that redirect file writes outside the intended temporary directories, you can look for suspicious symlinks within the OpenClaw temporary directories or monitor file writes that occur outside expected paths.

Suggested commands to detect potential exploitation attempts include:

  • Find symbolic links inside the OpenClaw temporary directories (replace /path/to/openclaw/tmp with the actual path): find /path/to/openclaw/tmp -type l -exec ls -l {} \;
  • Check for file writes outside the expected temporary directory by monitoring filesystem activity, for example using auditd or inotifywait on Linux.
  • Use commands like: auditctl -w /path/to/openclaw/tmp -p wa ausearch -f /path/to/openclaw/tmp or inotifywait -m -r /path/to/openclaw/tmp

Additionally, reviewing OpenClaw logs for errors related to path resolution or symlink rejections may help identify attempts to exploit this vulnerability.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade OpenClaw to version 2026.2.25 or later, where the vulnerability has been fixed.

The fix involves hardening the handling of browser trace and download temporary paths by strictly validating writable paths to ensure they remain within the designated root directory and rejecting any symlink-based escapes.

  • Upgrade OpenClaw to version 2026.2.25 or newer.
  • If immediate upgrade is not possible, restrict local user permissions to prevent creation of symbolic links in OpenClaw temporary directories.
  • Monitor and audit filesystem activity in the OpenClaw temporary directories to detect suspicious symlink creation or unauthorized file writes.
  • Consider applying custom patches or workarounds that enforce path validation similar to the fix described, if feasible.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart