/ data / vuln_en / openclaw / GHSA-7xmq-g46g-f8pv.yaml
GHSA-7xmq-g46g-f8pv.yaml
 1  info:
 2    name: OpenClaw
 3    cve: GHSA-7xmq-g46g-f8pv
 4    summary: OpenClaw Sandbox media TOCTOU could read files outside sandbox root
 5    details: >-
 6      Summary
 7  
 8      Sandbox media handling had a time-of-check/time-of-use gap: media paths could be validated first and read later through
 9      a separate path. A symlink retarget between those steps could cause reads outside sandboxRoot.
10  
11  
12      Impact
13  
14      Affected versions could permit host file reads outside the intended sandbox root in media attachment/image flows.
15  
16  
17      Fix
18  
19      Media reads now use consolidated root-scoped, boundary-safe read paths at use time, removing check/use drift across call
20      sites.
21  
22  
23      Affected and Patched Versions
24  
25      - Affected: <= 2026.2.26
26  
27      - Patched: 2026.3.1
28    cvss: ''
29    severity: MEDIUM
30    security_advise: Upgrade openclaw to >= 2026.3.1 or later. Media reads now use consolidated root-scoped, boundary-safe read
31      paths at use time, removing check/use drift across call sites.
32    references:
33    - https://github.com/openclaw/openclaw/security/advisories/GHSA-7xmq-g46g-f8pv
34  rule: version <= "2026.2.26"
35  references:
36  - https://github.com/openclaw/openclaw/security/advisories/GHSA-7xmq-g46g-f8pv