Directory Traversal Affecting openclaw package, versions <2026.2.24-r0


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.07% (23rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Directory Traversal vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-MINIMOSLATEST-OPENCLAW-15359118
  • published27 Feb 2026
  • disclosed25 Feb 2026

Introduced: 25 Feb 2026

NewCVE-2026-27699  (opens in a new tab)
CWE-22  (opens in a new tab)

How to fix?

Upgrade Minimos:latest openclaw to version 2026.2.24-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream openclaw package and not the openclaw package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

The basic-ftp FTP client library for Node.js contains a path traversal vulnerability (CWE-22) in versions prior to 5.2.0 in the downloadToDir() method. A malicious FTP server can send directory listings with filenames containing path traversal sequences (../) that cause files to be written outside the intended download directory. Version 5.2.0 patches the issue.

CVSS Base Scores

version 3.1