Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-h9xm-j4qg-fvpg | OpenClaw: Experimental apply_patch may bypass workspace-only checks in opt-in sandbox mounts (off by default) |
Fri, 20 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.23 contain a path traversal vulnerability in the experimental apply_patch tool that allows attackers with sandbox access to modify files outside the workspace directory by exploiting inconsistent enforcement of workspace-only checks on mounted paths. Attackers can use apply_patch operations on writable mounts outside the workspace root to access and modify arbitrary files on the system. | |
| Title | OpenClaw < 2026.2.23 - Sandbox Bypass in apply_patch Tool via Workspace-Only Check Bypass | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-20T20:13:16.999Z
Reserved: 2026-03-10T19:48:13.664Z
Link: CVE-2026-32007
Updated: 2026-03-20T20:13:11.990Z
Status : Analyzed
Published: 2026-03-19T22:16:33.370
Modified: 2026-03-24T21:22:35.050
Link: CVE-2026-32007
No data.
OpenCVE Enrichment
Updated: 2026-03-20T11:05:36Z
Github GHSA