JustAppSec
Back to news

openclaw SSH sandbox tar upload lets attackers write arbitrary files

2 min readPublished 27 Apr 2026Updated 27 Apr 2026Source: CVEProject (cvelistV5)

TL;DR - openclaw versions < 2026.3.31 follow symlinks when extracting tar archives during SSH sandbox uploads. A low-privileged remote attacker can craft a tar that writes files outside the sandbox boundary onto the host. Patch to 2026.3.31.

What happened

openclaw is an npm-distributed agent runtime that can sync sandbox state to a remote host over SSH. CVE-2026-41364 is a classic CWE-59 link-following bug in that sync path.

When the sandbox upload handler extracts a tar archive, it follows symlinks inside the archive without validating that the resolved path stays within the sandbox root. An attacker with enough access to trigger an upload can embed crafted symlinks and land files wherever the process has write permission on the remote host.

ItemDetail
Affected componentnpm package openclaw
Vulnerable versions< 2026.3.31
Patched version2026.3.31
WeaknessCWE-59 (link following)
SeverityCVSS 3.1 8.1 (High)
PrerequisitesNetwork reachable, PR:L, no user interaction

Arbitrary file write via archive extraction is a repeat offender in developer tooling and agent stacks. "Sync" features tend to run with broad filesystem permissions, which turns a path-traversal bug into a serious integrity problem fast.

Who is impacted

  • Any deployment running the npm package openclaw at versions < 2026.3.31.
  • Environments where users with low privilege (PR:L) can reach the functionality that triggers SSH sandbox tar uploads - this is not fully unauthenticated, but the bar is low.
  • Highest risk where the sandbox service runs with permissions that cover executable paths, service configs, cron jobs, or SSH authorized_keys.

What to do now

  • Upgrade openclaw to 2026.3.31 - the first version the CVE record marks as unaffected.
  • Inventory every place openclaw is installed: developer workstations, CI runners, agent host VMs. Check lockfiles and built artefacts, not just package manifests.
  • If you cannot immediately confirm who could have triggered uploads, treat this as a potential integrity incident:
    • review logs for sandbox sync and tar extraction events
    • inspect the remote host for unexpected file modifications in sensitive locations: service units, cron, startup scripts, SSH config, and key material

Related


Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.