Vulnerability Description
OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files. Attackers can exploit this by uploading tar archives containing symlinks to escape the sandbox and overwrite files on the remote host.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | < 2026.3.31 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/commit/3d5af14984ac1976c747a8e11581d697bd08Patch
- https://github.com/openclaw/openclaw/security/advisories/GHSA-fv94-qvg8-xqpwVendor Advisory
- https://www.vulncheck.com/advisories/openclaw-arbitrary-file-write-via-symlink-fThird Party Advisory
FAQ
What is CVE-2026-41364?
CVE-2026-41364 is a vulnerability with a CVSS score of 8.1 (HIGH). OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files. Attackers can exploit this by uploading tar archiv...
How severe is CVE-2026-41364?
CVE-2026-41364 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41364?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.