OpenClaw versions prior to 2026.2.12 fail to validate the sessionFile path parameter, allowing authenticated gateway clients to write transcript data to arbitrary locations on the host filesystem. Attackers can supply a sessionFile path outside the sessions directory to create files and append data repeatedly, potentially causing configuration corruption or denial of service.
Attack Parameters
Attack Vector
Network
Атака возможна удалённо
Attack Complexity
Low
Легко эксплуатировать
Attack Requirements
None
Нет дополнительных условий
Privileges Required
Low
Нужны базовые права
User Interaction
None
Не нужно действие пользователя
Impact Assessment
Confidentiality
None
Нет утечки данных
Integrity
Low
Частичная модификация данных
Availability
High
Полный отказ в обслуживании
CVSS Vector v4.0
Weakness Type (CWE)
References 4
https://github.com/openclaw/openclaw/commit/25950bcbb8ba4d8cde002557f6e27c219ae…
disclosure@vulncheck.com
https://github.com/openclaw/openclaw/commit/4199f9889f0c307b77096a229b9e085b8d8…
disclosure@vulncheck.com
https://github.com/openclaw/openclaw/security/advisories/GHSA-64qx-vpxx-mvqf
disclosure@vulncheck.com
https://www.vulncheck.com/advisories/openclaw-arbitrary-file-write-via-untruste…
disclosure@vulncheck.com