Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xvx8-77m6-gwg6 | OpenClaw: Sandbox `writeFile` commit could race outside the validated path |
Tue, 31 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 31 Mar 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability in the fs-bridge writeFile commit step that uses an unanchored container path during the final move operation. An attacker can exploit a time-of-check-time-of-use race condition by modifying parent paths inside the sandbox to redirect committed files outside the validated writable path within the container mount namespace. | |
| Title | OpenClaw < 2026.3.11 - Sandbox Boundary Bypass via Unanchored writeFile Commit Path | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-367 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-31T13:28:21.918Z
Reserved: 2026-03-17T11:31:33.584Z
Link: CVE-2026-32977
Updated: 2026-03-31T13:28:17.918Z
Status : Analyzed
Published: 2026-03-31T12:16:29.660
Modified: 2026-04-02T13:14:46.600
Link: CVE-2026-32977
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:38:58Z
Github GHSA