Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-27cr-4p5m-74rj

Опубликовано: 03 мар. 2026
Источник: github
Github: Прошло ревью
CVSS4: 5.7
CVSS3: 7.5

Описание

OpenClaw has a workspace-only sandbox guard mismatch for @-prefixed absolute paths

A workspace-only file-system guard mismatch allowed @-prefixed absolute paths to bypass boundary validation in some tool path checks.

Impact

When tools.fs.workspaceOnly=true, certain @-prefixed absolute paths (for example @/etc/passwd) could be validated before canonicalization while runtime path handling normalized the prefix differently. In affected code paths this could permit reads outside the intended workspace boundary.

Per SECURITY.md, OpenClaw is primarily a personal-assistant runtime with trusted-user assumptions, and this path is gated behind non-default sandbox/tooling configuration. That reduces practical exposure, but the bypass is still a security bug and is fixed.

Affected Packages / Versions

  • Package: openclaw (npm)
  • Latest published at triage time: 2026.2.23
  • Affected versions: <= 2026.2.23
  • Patched versions: >= 2026.2.24

Fix Commit(s)

  • 9ef0fc2ff8fa7b145d1e746d6eb030b1bf692260

OpenClaw thanks @tdjackey for reporting.

Пакеты

Наименование

openclaw

npm
Затронутые версииВерсия исправления

<= 2026.2.23

2026.2.24

EPSS

Процентиль: 17%
0.00053
Низкий

5.7 Medium

CVSS4

7.5 High

CVSS3

Дефекты

CWE-180
CWE-22

Связанные уязвимости

CVSS3: 6.5
nvd
14 дней назад

OpenClaw versions prior to 2026.2.24 contain a path traversal vulnerability where @-prefixed absolute paths bypass workspace-only file-system boundary validation due to canonicalization mismatch. Attackers can exploit this by crafting @-prefixed paths like @/etc/passwd to read files outside the intended workspace boundary when tools.fs.workspaceOnly is enabled.

EPSS

Процентиль: 17%
0.00053
Низкий

5.7 Medium

CVSS4

7.5 High

CVSS3

Дефекты

CWE-180
CWE-22