CVE-2026-32054: OpenClaw has browser trace/download path symlink escape in temp output handling
(updated )
Browser trace/download output path handling allowed symlink-root and symlink-parent escapes from the managed temp root.
References
- github.com/advisories/GHSA-36h3-7c54-j27r
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/496a76c03ba85e15ea715e5a583e498ae04d36e3
- github.com/openclaw/openclaw/security/advisories/GHSA-36h3-7c54-j27r
- nvd.nist.gov/vuln/detail/CVE-2026-32054
- www.vulncheck.com/advisories/openclaw-symlink-traversal-in-browser-trace-download-path-handling
Code Behaviors & Features
Detect and mitigate CVE-2026-32054 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →