GHSA-xvx8-77m6-gwg6

Suggest an improvement
Source
https://github.com/advisories/GHSA-xvx8-77m6-gwg6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-xvx8-77m6-gwg6/GHSA-xvx8-77m6-gwg6.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-xvx8-77m6-gwg6
Aliases
  • CVE-2026-32977
Downstream
Published
2026-03-13T15:47:15Z
Modified
2026-04-06T23:06:26.145186Z
Severity
  • 6.3 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
Summary
OpenClaw: Sandbox `writeFile` commit could race outside the validated path
Details

Summary

In affected versions of openclaw, the sandbox fs-bridge writeFile commit step used an unanchored container path during the final move into place. An attacker racing parent-path changes inside the sandbox could redirect the committed file outside the validated sandbox path.

Impact

This is a sandbox boundary bypass. In-sandbox code could win a time-of-check-time-of-use race and cause host-approved writeFile operations to land outside the validated writable path within the container mount namespace.

Affected Packages and Versions

  • Package: openclaw (npm)
  • Affected versions: < 2026.3.11
  • Fixed in: 2026.3.11

Technical Details

The hardening work for anchored remove, rename, and mkdir operations did not fully cover the writeFile commit path. The final mv still used the raw target path, leaving a race window between safety revalidation and the in-container commit step.

Fix

OpenClaw now anchors the writeFile commit path to the canonical parent directory before the final move. The fix shipped in openclaw@2026.3.11.

Workarounds

Upgrade to 2026.3.11 or later.

Database specific
{
    "github_reviewed": true,
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-367"
    ],
    "github_reviewed_at": "2026-03-13T15:47:15Z",
    "severity": "MODERATE"
}
References

Affected packages

npm / openclaw

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2026.3.11

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-xvx8-77m6-gwg6/GHSA-xvx8-77m6-gwg6.json"