Medium severity6.3NVD Advisory· Published Mar 31, 2026· Updated Apr 2, 2026
CVE-2026-32977
CVE-2026-32977
Description
OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability in the fs-bridge writeFile commit step that uses an unanchored container path during the final move operation. An attacker can exploit a time-of-check-time-of-use race condition by modifying parent paths inside the sandbox to redirect committed files outside the validated writable path within the container mount namespace.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
openclawnpm | < 2026.3.11 | 2026.3.11 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-xvx8-77m6-gwg6ghsaADVISORY
- github.com/openclaw/openclaw/security/advisories/GHSA-xvx8-77m6-gwg6nvdVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-32977ghsaADVISORY
- www.vulncheck.com/advisories/openclaw-sandbox-boundary-bypass-via-unanchored-writefile-commit-pathnvdThird Party AdvisoryWEB
- github.com/openclaw/openclaw/releases/tag/v2026.3.11ghsaWEB
News mentions
0No linked articles in our index yet.