


Perceptive Security
SOC/SIEM Consultancy

OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability in fs-bridge staged writes where temporary file creation and population are not pinne…
Published:
30 March 2026 at 22:00:00
Alert date:
31 March 2026 at 13:04:59
Source:
nvd.nist.gov
Security Tools
OpenClaw versions before 2026.3.11 contain a critical sandbox boundary bypass vulnerability in fs-bridge staged writes. The vulnerability stems from temporary file creation and population not being pinned to a verified parent directory. Attackers can exploit a race condition in parent-path alias changes to write malicious bytes outside the intended validated path. This occurs before the final guarded replace step executes, allowing attackers to bypass sandbox protections. The vulnerability affects the file system bridge component's staged write operations, potentially allowing arbitrary file writes outside the sandbox environment.
Technical details
Mitigation steps:
Affected products:
OpenClaw
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-32988
https://github.com/openclaw/openclaw/security/advisories/GHSA-mj4p-rc52-m843
https://www.vulncheck.com/advisories/openclaw-sandbox-boundary-bypass-via-unvalidated-temporary-file-creation
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
