CVE-2026-28459

7.1 HIGH

📋 TL;DR

OpenClaw versions before 2026.2.12 have an arbitrary file write vulnerability where authenticated gateway clients can manipulate the sessionFile path parameter to write transcript data to arbitrary locations on the host filesystem. This allows attackers to create or append files outside intended directories, potentially leading to configuration corruption or denial of service. Only authenticated users can exploit this vulnerability.

💻 Affected Systems

Products:
  • OpenClaw
Versions: All versions prior to 2026.2.12
Operating Systems: All platforms running OpenClaw
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated gateway client access; default installations are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could overwrite critical system files, corrupt configurations, or fill disk space causing denial of service, potentially leading to system compromise or data loss.

🟠

Likely Case

Attackers create or append files to arbitrary locations, potentially corrupting application configurations or causing service disruption through disk space exhaustion.

🟢

If Mitigated

With proper file permissions and monitoring, impact is limited to application-level configuration issues that can be restored from backups.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2026.2.12

Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-64qx-vpxx-mvqf

Restart Required: Yes

Instructions:

1. Download OpenClaw version 2026.2.12 or later from official sources. 2. Stop the OpenClaw service. 3. Backup configuration files. 4. Install the updated version. 5. Restart the OpenClaw service.

🔧 Temporary Workarounds

Restrict file system permissions

linux

Limit OpenClaw process permissions to only necessary directories

chmod 750 /var/lib/openclaw/sessions
chown openclaw:openclaw /var/lib/openclaw/sessions

Implement input validation at proxy

all

Add WAF or reverse proxy rules to block malicious sessionFile parameters

🧯 If You Can't Patch

  • Implement strict file system permissions for OpenClaw directories
  • Monitor for unusual file creation patterns in system directories

🔍 How to Verify

Check if Vulnerable:

Check OpenClaw version: if version is less than 2026.2.12, system is vulnerable.

Check Version:

openclaw --version

Verify Fix Applied:

Verify OpenClaw version is 2026.2.12 or higher and test that sessionFile parameter cannot write outside sessions directory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation events in system logs
  • OpenClaw logs showing sessionFile paths outside /var/lib/openclaw/sessions

Network Indicators:

  • HTTP requests with manipulated sessionFile parameters containing path traversal sequences

SIEM Query:

source="openclaw.log" AND (sessionFile CONTAINS ".." OR sessionFile NOT STARTSWITH "/var/lib/openclaw/sessions")

🔗 References

📤 Share & Export