/ data / vuln_en / openclaw / CVE-2026-41296.yaml
CVE-2026-41296.yaml
 1  info:
 2    name: OpenClaw
 3    cve: CVE-2026-41296
 4    summary: OpenClaw Remote Filesystem Bridge TOCTOU Race Condition Allows Sandbox Escape
 5    details: >-
 6      OpenClaw before 2026.3.31 contains a time-of-check-time-of-use (TOCTOU) race
 7      condition in the remote filesystem bridge readFile function that allows sandbox
 8      escape. Attackers can exploit the separate path validation and file read operations
 9      to bypass sandbox restrictions and read arbitrary files. The vulnerability requires
10      low privileges (PR:L) and network access (AV:N), with high confidentiality and
11      integrity impact (C:H/I:H) and a changed scope (S:C), resulting in a CVSS score
12      of 8.2 (HIGH).
13    cvss: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
14    severity: HIGH
15    security_advise: Upgrade OpenClaw to version 2026.3.31 or later. The fix addresses
16      the TOCTOU race condition by ensuring path validation and file read are performed
17      atomically. Refer to the official security advisory GHSA-9p3r-hh9g-5cmg for details.
18    references:
19    - https://github.com/openclaw/openclaw/commit/121870a08583033ed6a0ed73d9ffea32991252bb
20    - https://github.com/openclaw/openclaw/security/advisories/GHSA-9p3r-hh9g-5cmg
21    - https://www.vulncheck.com/advisories/openclaw-sandbox-escape-via-toctou-race-in-remote-fs-bridge-readfile
22  rule: 'version < "2026.3.31"'
23  references:
24  - https://github.com/openclaw/openclaw/commit/121870a08583033ed6a0ed73d9ffea32991252bb
25  - https://github.com/openclaw/openclaw/security/advisories/GHSA-9p3r-hh9g-5cmg
26  - https://www.vulncheck.com/advisories/openclaw-sandbox-escape-via-toctou-race-in-remote-fs-bridge-readfile