Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gq9c-wg68-gwj2 | OpenClaw has a path traversal in browser trace/download output paths may allow arbitrary file writes |
Mon, 09 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.13 contain a vulnerability in the browser control API in which it accepts user-supplied output paths for trace and download files without consistently constraining writes to temporary directories. Attackers with API access can exploit path traversal in POST /trace/stop, POST /wait/download, and POST /download endpoints to write files outside intended temp roots. | |
| Title | OpenClaw < 2026.2.13 - Path Traversal in Trace and Download Output Paths | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-09T17:26:51.144Z
Reserved: 2026-02-27T19:18:20.638Z
Link: CVE-2026-28462
Updated: 2026-03-09T17:25:12.944Z
Status : Analyzed
Published: 2026-03-05T22:16:18.873
Modified: 2026-03-09T17:32:54.197
Link: CVE-2026-28462
No data.
OpenCVE Enrichment
Updated: 2026-04-16T12:15:35Z
Github GHSA