CVE-2026-28482
EUVD-2026-992805.03.2026, 22:16
OpenClaw versions prior to 2026.2.12 construct transcript file paths using unsanitized sessionId parameters and sessionFile paths without enforcing directory containment. Authenticated attackers can exploit path traversal sequences like ../../etc/passwd in sessionId or sessionFile parameters to read or write arbitrary files outside the agent sessions directory.
Awaiting analysis
This vulnerability is currently awaiting analysis.
References