Skip to content
CVSS 8.1 · HIGH

CVE-2026-41364

OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files. Attackers can exploit this by uploading tar archives containing symlinks to escape the sandbox and overwrite files on the remote host.

View on NVD

Analysis

OpenClaw is a niche open-source game engine recreation. While an arbitrary file write via symlink follow is a high-severity bug, the product is not used in professional software development, cloud infrastructure, or common consumer environments, making it irrelevant to the target audience.

Severity

Score: 8.1(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: NONE
I: HIGH
A: HIGH
Weakness (CWE): CWE-59

EPSS

Probability of exploitation (next 30 days): 0.0017 (0.2%)
Percentile: 37.2%
EPSS: 2026-05-06

Affects

openclaw:openclaw

Technical description

OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files. Attackers can exploit this by uploading tar archives containing symlinks to escape the sandbox and overwrite files on the remote host.

Published: 4/28/2026, 12:16:25 AM
Last modified: 4/28/2026, 6:45:44 PM

References

HomeEventsBlogResourcesTeam