GHSA-m34q-h93w-vg5x: openclaw: path traversal enables remote dir overwrite
GHSA-m34q-h93w-vg5x MEDIUMopenclaw's OpenShell mirror-sync backend accepted arbitrary absolute paths for remoteWorkspaceDir and remoteAgentWorkspaceDir without validation, allowing any caller who could influence those config values to trigger deletion and overwrite of any remote directory the process had access to. For AI teams running openclaw in automated agent pipelines or shared development environments, this is a destructive write primitive — an attacker who controls config delivery (e.g., via a malicious skill, compromised config store, or MITM of config sync) could wipe production agent workspaces or replace them with attacker-controlled content, potentially enabling follow-on code execution. There is no public exploit and it is not in CISA KEV, but the package has 37 prior CVEs and a history of supply-chain abuse in its skills ecosystem. Upgrade to openclaw >= 2026.4.2 immediately; audit any pipeline that passes remote workspace paths from untrusted sources.
Risk Assessment
Medium severity with above-average contextual risk for AI environments. The CWE-22 path traversal is a well-understood vulnerability class, but the destructive nature (delete + overwrite) elevates impact beyond typical read-only traversal bugs. Exploitability requires ability to influence OpenShell config values — non-trivial but achievable via malicious skills, misconfigured config management, or insider threat. No EPSS data or public PoC exists. The 37 prior CVEs in the same package signal persistent security debt. Highest risk in multi-tenant or CI/CD contexts where openclaw agents run with broad filesystem access.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| openclaw | npm | <= 2026.4.1 | 2026.4.2 |
Do you use openclaw? You're affected.
Severity & Risk
Recommended Action
- Patch immediately: upgrade openclaw to >= 2026.4.2 which constrains mirror sync roots to allowed paths.
- Until patched, disable or firewall the OpenShell mirror-sync backend if not actively needed.
- Audit current OpenShell configurations for unexpected absolute paths in remoteWorkspaceDir or remoteAgentWorkspaceDir values.
- Enforce least-privilege: run openclaw processes with a dedicated service account scoped to only the directories they legitimately need.
- Review audit logs for mirror-sync operations targeting paths outside expected workspace roots.
- In CI/CD pipelines, validate all config values sourced from external inputs before passing to openclaw.
- Given the 37 CVEs in this package, evaluate whether openclaw is a long-term acceptable dependency or whether migration is warranted.
Classification
Compliance Impact
This CVE is relevant to:
Related AI Incidents (1)
Source: AI Incident Database (AIID)
Technical Details
NVD Description
## Summary Before OpenClaw 2026.4.2, the OpenShell mirror backend accepted arbitrary absolute `remoteWorkspaceDir` and `remoteAgentWorkspaceDir` values. In mirror mode, those paths were then used as the target of remote cleanup and overwrite operations. ## Impact If an attacker could influence those OpenShell config values, mirror sync could delete the contents of an unintended remote directory and replace them with uploaded workspace data. This was a destructive remote-path bug in the mirror-sync path. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `<= 2026.4.1` - Patched versions: `>= 2026.4.2` - Latest published npm version: `2026.4.1` ## Fix Commit(s) - `b21c9840c2e38f4bb338d031511b479d5f07ca25` — constrain OpenShell mirror sync roots ## Release Process Note The fix is present on `main` and is staged for OpenClaw `2026.4.2`. Publish this advisory after the `2026.4.2` npm release is live. Thanks @jufeng123768 for reporting.
Exploitation Scenario
An adversary with access to openclaw's skill/plugin ecosystem (as seen in AIID #1368 where ~17% of ClawHub skills were reportedly malicious) publishes a skill that modifies the OpenShell mirror configuration to set remoteWorkspaceDir to a sensitive path such as /opt/ai-platform/models or /home/service-account/.ssh. When the victim's openclaw agent runs the compromised skill and subsequently triggers a mirror-sync operation, the backend deletes the contents of that remote directory and replaces it with the attacker's uploaded workspace data. In a CI/CD context, this could overwrite model artifacts with backdoored versions, or destroy training checkpoints. In an agentic workflow with persistent memory, overwriting the agent's workspace could inject malicious instructions into future agent sessions.
Weaknesses (CWE)
References
Timeline
Related Vulnerabilities
CVE-2026-30741 9.8 OpenClaw: RCE via request-side prompt injection
Same package: openclaw CVE-2026-28451 9.3 OpenClaw: SSRF via Feishu extension exposes internal services
Same package: openclaw GHSA-m3mh-3mpg-37hw 8.6 OpenClaw: .npmrc hijack enables RCE on plugin install
Same package: openclaw CVE-2026-27001 7.8 OpenClaw: prompt injection via unsanitized workspace path
Same package: openclaw GHSA-hr5v-j9h9-xjhg 7.7 OpenClaw: sandbox escape via mediaUrl path traversal
Same package: openclaw
AI Threat Alert