GHSA-2cwr-f5hx-gg3w: Duplicate Advisory: OpenClaw: stageSandboxMedia destination symlink traversal can overwrite files outside sandbox workspace
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-cfvj-7rx7-fc7c. This link is maintained to preserve external references.
Original Description
OpenClaw versions prior to 2026.3.2 contain a vulnerability in the stageSandboxMedia function in which it fails to validate destination symlinks during media staging, allowing writes to follow symlinks outside the sandbox workspace. Attackers can exploit this by placing symlinks in the media/inbound directory to overwrite arbitrary files on the host system outside sandbox boundaries.
References
- github.com/advisories/GHSA-2cwr-f5hx-gg3w
- github.com/openclaw/openclaw/commit/17ede52a4be3034f6ec4b883ac6b81ad0101558a
- github.com/openclaw/openclaw/security/advisories/GHSA-cfvj-7rx7-fc7c
- nvd.nist.gov/vuln/detail/CVE-2026-31990
- www.vulncheck.com/advisories/openclaw-symlink-traversal-in-stagesandboxmedia-destination
Code Behaviors & Features
Detect and mitigate GHSA-2cwr-f5hx-gg3w with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →