CVE-2026-41296.yaml
1 info: 2 name: OpenClaw 3 cve: CVE-2026-41296 4 summary: OpenClaw Remote Filesystem Bridge TOCTOU Race Condition Allows Sandbox Escape 5 details: >- 6 OpenClaw before 2026.3.31 contains a time-of-check-time-of-use (TOCTOU) race 7 condition in the remote filesystem bridge readFile function that allows sandbox 8 escape. Attackers can exploit the separate path validation and file read operations 9 to bypass sandbox restrictions and read arbitrary files. The vulnerability requires 10 low privileges (PR:L) and network access (AV:N), with high confidentiality and 11 integrity impact (C:H/I:H) and a changed scope (S:C), resulting in a CVSS score 12 of 8.2 (HIGH). 13 cvss: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N 14 severity: HIGH 15 security_advise: Upgrade OpenClaw to version 2026.3.31 or later. The fix addresses 16 the TOCTOU race condition by ensuring path validation and file read are performed 17 atomically. Refer to the official security advisory GHSA-9p3r-hh9g-5cmg for details. 18 references: 19 - https://github.com/openclaw/openclaw/commit/121870a08583033ed6a0ed73d9ffea32991252bb 20 - https://github.com/openclaw/openclaw/security/advisories/GHSA-9p3r-hh9g-5cmg 21 - https://www.vulncheck.com/advisories/openclaw-sandbox-escape-via-toctou-race-in-remote-fs-bridge-readfile 22 rule: 'version < "2026.3.31"' 23 references: 24 - https://github.com/openclaw/openclaw/commit/121870a08583033ed6a0ed73d9ffea32991252bb 25 - https://github.com/openclaw/openclaw/security/advisories/GHSA-9p3r-hh9g-5cmg 26 - https://www.vulncheck.com/advisories/openclaw-sandbox-escape-via-toctou-race-in-remote-fs-bridge-readfile