Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vhwf-4x96-vqx2 | OpenClaw's skills-install-download can be redirected outside the tools root by rebinding the validated base path |
Mon, 30 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 29 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.8 contains a path traversal vulnerability in the skills download installer that validates the tools root lexically but reuses the mutable path during archive download and copy operations. A local attacker can rebind the tools-root path between validation and final write to redirect the installer outside the intended tools directory. | |
| Title | OpenClaw < 2026.3.8 - Path Traversal via Tools Root Rebinding in Skills Download | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-367 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-30T14:29:12.143Z
Reserved: 2026-03-23T11:00:48.408Z
Link: CVE-2026-33574
Updated: 2026-03-30T14:29:00.863Z
Status : Analyzed
Published: 2026-03-29T13:17:03.173
Modified: 2026-03-31T17:12:54.940
Link: CVE-2026-33574
No data.
OpenCVE Enrichment
Updated: 2026-03-30T06:58:11Z
Github GHSA