Skip to content
CVSS 8.1 · HIGH

CVE-2026-41364

OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files. Attackers can exploit this by uploading tar archives containing symlinks to escape the sandbox and overwrite files on the remote host.

Ver en NVD

Análisis

OpenClaw is a niche open-source game engine recreation. While an arbitrary file write via symlink follow is a high-severity bug, the product is not used in professional software development, cloud infrastructure, or common consumer environments, making it irrelevant to the target audience.

Severidad

Puntaje: 8.1(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: NONE
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-59

EPSS

Probabilidad de explotación (próx. 30 días): 0.0017 (0.2%)
Percentil: 37.2%
EPSS: 2026-05-06

Afecta

openclaw:openclaw

Descripción técnica

OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files. Attackers can exploit this by uploading tar archives containing symlinks to escape the sandbox and overwrite files on the remote host.

Publicada: 28/4/2026, 0:16:25
Última modificación: 28/4/2026, 18:45:44

Referencias

InicioEventosBlogRecursosEquipo