OpenClaw: The 'AI' That Let You Write Files Anywhere
Vulnerability ID: GHSA-QRQ5-WJGG-RVQW
CVSS Score: 8.8
Published: 2026-02-17
In the race to build the ultimate AI assistant, the developers of OpenClaw (formerly Moltbot) forgot one of the oldest rules in the book: never trust user input, especially when that input tells you where to write files. GHSA-QRQ5-WJGG-RVQW is a critical Path Traversal vulnerability that turns a helpful plugin installation process into an arbitrary file write primitive. By simply crafting a malicious 'package.json', an attacker can escape the application's sandbox and overwrite system files, leading to Remote Code Execution (RCE). It's a classic case of convenience over security, proving that even modern AI frameworks can suffer from 1990s-era bugs.
TL;DR
Critical Path Traversal in OpenClaw's plugin installer allows attackers to write files to arbitrary locations via malicious package names. Fixed in v2026.2.1.
⚠️ Exploit Status: POC
Technical Details
- Vulnerability Type: Path Traversal
- Attack Vector: Network (via Package Install)
- CWE ID: CWE-22
- CVSS Score: 8.8 (High)
- Impact: Arbitrary File Write / RCE
- Fix Version: v2026.2.1
Affected Systems
- OpenClaw
- Moltbot
- Clawdbot
-
OpenClaw: < 2026.2.1 (Fixed in:
2026.2.1)
Code Analysis
Commit: d03eca8
fix(security): prevent path traversal in plugin and hook names
function resolveSafeInstallDir(...) { ... const relative = path.relative(resolvedBase, resolvedTarget); ... }
Mitigation Strategies
- Input Validation: Sanitize all file path inputs.
- Path Canonicalization: Use path.resolve() to get absolute paths.
- Directory Confinement: Use path.relative() to ensure targets are within the sandbox.
- Least Privilege: Run the application with restricted user permissions.
Remediation Steps:
- Stop the OpenClaw service.
- Backup your current configuration and database.
- Upgrade OpenClaw to version 2026.2.1 or later.
- Inspect the 'extensions' and 'hooks' directories for unknown or suspicious subdirectories.
- Restart the service.
References
Read the full report for GHSA-QRQ5-WJGG-RVQW on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)