GHSA-ffr4-mrhv-vfr2

Suggest an improvement
Source
https://github.com/advisories/GHSA-ffr4-mrhv-vfr2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-ffr4-mrhv-vfr2/GHSA-ffr4-mrhv-vfr2.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-ffr4-mrhv-vfr2
Downstream
Withdrawn
2026-03-27T20:18:56Z
Published
2026-03-21T03:31:14Z
Modified
2026-03-27T20:33:56.801358Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H CVSS Calculator
  • 5.9 (Medium) CVSS_V4 - CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
Duplicate Advisory: OpenClaw has browser trace/download path symlink escape in temp output handling
Details

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-36h3-7c54-j27r. This link is maintained to preserve external references.

Original Description

OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in browser trace and download output path handling that allows local attackers to escape the managed temp root directory. An attacker with local access can create symlinks to route file writes outside the intended temp directory, enabling arbitrary file overwrite on the affected system.

Database specific
{
    "nvd_published_at": "2026-03-21T01:17:08Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-59"
    ],
    "github_reviewed_at": "2026-03-27T20:18:56Z"
}
References

Affected packages

npm / openclaw

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected

Database specific

last_known_affected_version_range
"< 2026.2.25"
source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-ffr4-mrhv-vfr2/GHSA-ffr4-mrhv-vfr2.json"