CVE-2026-35632
Symlink Traversal in OpenClaw Agents Enables Remote Code Execution
Publication date: 2026-04-09
Last updated on: 2026-04-15
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.2.22 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-61 | The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in OpenClaw versions through 2026.2.22 and involves a symlink traversal issue in the agents.create and agents.update handlers. These handlers use the fs.appendFile function on a file named IDENTITY.md without checking for symlink containment. As a result, an attacker who has access to the workspace can create symbolic links that cause attacker-controlled content to be appended to arbitrary files.
This can lead to serious consequences such as remote code execution through crontab injection or unauthorized access by manipulating SSH keys.
How can this vulnerability impact me? :
The vulnerability can have significant impacts including allowing an attacker with workspace access to execute arbitrary code remotely by injecting malicious entries into crontab files.
Additionally, it can enable unauthorized access by modifying SSH keys, potentially compromising system security and allowing attackers to gain persistent access.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows attackers with workspace access to append arbitrary content to critical system files, potentially leading to remote code execution or unauthorized access via SSH key manipulation.
Such unauthorized access and potential system compromise could lead to violations of data protection and security requirements mandated by common standards and regulations like GDPR and HIPAA, which require safeguarding system integrity and preventing unauthorized access to sensitive data.
However, the provided information does not explicitly discuss compliance impacts or specific regulatory considerations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves symlink traversal in the OpenClaw agents.create and agents.update handlers, which append data to the IDENTITY.md file without symlink containment checks.
To detect if your system is vulnerable, you can check for the presence of symbolic links named IDENTITY.md within agent workspaces that point to sensitive files such as /etc/crontab, ~/.ssh/authorized_keys, or shell profile files.
Suggested commands to detect suspicious symlinks include:
- Find symlinks named IDENTITY.md in the workspace directories: find /path/to/agent/workspaces -type l -name 'IDENTITY.md' -ls
- Check where these symlinks point to: ls -l /path/to/agent/workspaces/*/IDENTITY.md
- Verify if the symlink targets are sensitive files: for link in $(find /path/to/agent/workspaces -type l -name 'IDENTITY.md'); do readlink -f "$link"; done
Additionally, monitoring for unexpected modifications to critical files like /etc/crontab or ~/.ssh/authorized_keys could indicate exploitation attempts.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting workspace access to trusted users only, as the vulnerability requires local write access to the agent workspace.
Remove or audit any existing symlinks named IDENTITY.md within agent workspaces to ensure they do not point to sensitive files.
Implement monitoring and alerting for unauthorized changes to critical system files such as /etc/crontab and ~/.ssh/authorized_keys.
Avoid using vulnerable versions of OpenClaw (prior to 2026.2.22) until a patch is released, or consider disabling the agents.create and agents.update handlers if possible.
Apply strict file system permissions to prevent unauthorized creation of symlinks in the agent workspace.