CVE-2026-33572
Insecure File Permissions in OpenClaw Allow Local Data Exposure
Publication date: 2026-03-29
Last updated on: 2026-03-31
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.2.17 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-378 | Opening temporary files without appropriate measures or controls can leave the file, its contents and any function that it impacts vulnerable to attack. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability allows local attackers on a multi-user system to read session transcript files that contain sensitive information.
By accessing these transcript JSONL files, attackers can extract secrets and other sensitive data output by tools during sessions.
Such unauthorized access can lead to information disclosure and compromise of confidential data.
Can you explain this vulnerability to me?
CVE-2026-33572 is a vulnerability in OpenClaw versions before 2026.2.17 where session transcript files, stored as JSONL files, were created with overly broad default file permissions.
Because these files did not enforce user-only permissions and relied on the host environment's umask settings, local users on multi-user systems could read these transcript files.
This allowed attackers with local access to extract sensitive information, including secrets from tool output.
The root cause was incorrect default permissions (CWE-276) and incorrect permission assignment for critical resources (CWE-732).
The issue was fixed in version 2026.2.17 by explicitly setting file permissions to 0o600 (read and write for owner only) when creating these transcript files.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the file permissions of session transcript JSONL files created by OpenClaw. Specifically, you should look for transcript files with permissions more permissive than user-only read/write (i.e., permissions other than 600).
You can use commands to find these files and inspect their permissions. For example, on a Unix-like system, you can run:
- find /path/to/openclaw/sessions -name '*.jsonl' -exec ls -l {} + | grep -v '^-rw-------'
This command searches for all JSONL transcript files in the OpenClaw sessions directory and lists those that do not have the strict 600 permission mode, indicating potentially vulnerable files.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability immediately, you should upgrade OpenClaw to version 2026.2.17 or later, where the issue has been fixed by enforcing strict file permissions (600) on session transcript files.
If upgrading is not immediately possible, you can manually fix the permissions of existing transcript files by setting them to user-only read/write (600). For example, run:
- chmod 600 /path/to/openclaw/sessions/*.jsonl
Additionally, you can run the OpenClaw security audit fix command which has been extended to remediate existing transcript files' permissions:
- openclaw security audit --fix
This command scans the sessions directory and corrects permissions on transcript files to prevent unauthorized access.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in OpenClaw prior to version 2026.2.17 involves session transcript JSONL files being created with overly broad default permissions, allowing local users to read sensitive information including secrets from tool output.
This exposure of sensitive data due to improper file permissions could lead to non-compliance with data protection standards and regulations such as GDPR and HIPAA, which require strict controls on access to sensitive information.
By allowing unauthorized local users to access sensitive session transcripts, the vulnerability increases the risk of data breaches and unauthorized disclosure, which are critical compliance concerns under these regulations.
The issue was fixed in version 2026.2.17 by enforcing strict user-only read/write permissions (0o600) on transcript files, mitigating the risk of unauthorized access and helping maintain compliance with security requirements.