GHSA-fv94-qvg8-xqpw

Suggest an improvement
Source
https://github.com/advisories/GHSA-fv94-qvg8-xqpw
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-fv94-qvg8-xqpw/GHSA-fv94-qvg8-xqpw.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-fv94-qvg8-xqpw
Aliases
  • CVE-2026-41364
Downstream
Published
2026-04-02T21:23:32Z
Modified
2026-05-06T19:21:55.139744Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
  • 7.2 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
OpenClaw: SSH sandbox tar upload follows symlinks, enabling arbitrary file write on remote host
Details

Summary

SSH sandbox tar upload follows symlinks, enabling arbitrary file write on remote host

Current Maintainer Triage

  • Status: open
  • Normalized severity: high
  • Assessment: Real in shipped v2026.3.28: SSH sandbox tar upload lacked pre-upload symlink escape rejection until 3d5af14984 on 2026-03-31; maintainers already accepted it and the fix is unreleased.

Affected Packages / Versions

  • Package: openclaw (npm)
  • Latest published npm version: 2026.3.31
  • Vulnerable version range: <=2026.3.28
  • Patched versions: >= 2026.3.31
  • First stable tag containing the fix: v2026.3.31

Fix Commit(s)

  • 3d5af14984ac1976c747a8e11581d697bd0829dc — 2026-03-31T19:56:45+09:00

OpenClaw thanks @AntAISecurityLab for reporting.

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2026-04-02T21:23:32Z",
    "cwe_ids": [
        "CWE-59",
        "CWE-61"
    ],
    "severity": "HIGH",
    "nvd_published_at": null
}
References

Affected packages

npm / openclaw

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2026.3.31

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-fv94-qvg8-xqpw/GHSA-fv94-qvg8-xqpw.json"
last_known_affected_version_range
"<= 2026.3.28"