UNIX Symbolic Link (Symlink) Following Affecting openclaw package, versions <2026.3.24-beta.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-OPENCLAW-15797933
  • published28 Mar 2026
  • disclosed26 Mar 2026
  • creditYLChen-007

Introduced: 26 Mar 2026

New CVE NOT AVAILABLE CWE-61  (opens in a new tab)

How to fix?

Upgrade openclaw to version 2026.3.24-beta.1 or higher.

Overview

openclaw is a 🦞 OpenClaw — Personal AI Assistant

Affected versions of this package are vulnerable to UNIX Symbolic Link (Symlink) Following via the agents.create and agents.update processes. An attacker can append arbitrary content to files outside the intended workspace by planting a symlink at the IDENTITY.md path, which is then followed by the file append operation. This enables modification of sensitive system or user files with attacker-controlled data.

CVSS Base Scores

version 4.0
version 3.1