top of page
perceptive_background_267k.jpg

OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability in fs-bridge staged writes where temporary file creation and population are not pinne…

Published:

30 March 2026 at 22:00:00

Alert date:

31 March 2026 at 13:04:59

Source:

nvd.nist.gov

Click to open the original link from this advisory

Security Tools

OpenClaw versions before 2026.3.11 contain a critical sandbox boundary bypass vulnerability in fs-bridge staged writes. The vulnerability stems from temporary file creation and population not being pinned to a verified parent directory. Attackers can exploit a race condition in parent-path alias changes to write malicious bytes outside the intended validated path. This occurs before the final guarded replace step executes, allowing attackers to bypass sandbox protections. The vulnerability affects the file system bridge component's staged write operations, potentially allowing arbitrary file writes outside the sandbox environment.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page