CVE-2026-43570: OpenClaw contains a symlink traversal vulnerability
(updated )
OpenClaw versions 2026.3.22 before 2026.4.5 contain a symlink traversal vulnerability in remote marketplace repository path handling that allows attackers to escape the expected repository root. Attackers can exploit this by providing crafted symlink paths to access files outside the intended repository directory.
References
- github.com/advisories/GHSA-35mw-5vvr-vrxc
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/94b0062e90467e1582b47cc971f308457c537f3a
- github.com/openclaw/openclaw/commit/b1dd3ded3589f6fa60ab85b3930a82d538edaeae
- github.com/openclaw/openclaw/security/advisories/GHSA-cr8r-7g2h-6wr6
- nvd.nist.gov/vuln/detail/CVE-2026-43570
- www.vulncheck.com/advisories/openclaw-symlink-traversal-in-remote-marketplace-repository-path-handling
Code Behaviors & Features
Detect and mitigate CVE-2026-43570 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →