Cyber Posture

CVE-2026-41364

HighPublic PoC

Published: 28 April 2026

Published
28 April 2026
Modified
28 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0017 37.3th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files. Attackers can exploit this by uploading tar archives containing symlinks to escape the sandbox and overwrite files on the…

more

remote host.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Validates information inputs such as uploaded tar archives to block symlinks that enable sandbox escape and arbitrary file overwrites.

prevent

Provides for timely identification, reporting, and patching of the symlink following flaw in OpenClaw's SSH sandbox tar upload.

detect

Performs integrity checks to detect unauthorized file modifications resulting from symlink-based sandbox escapes.

Security SummaryAI

CVE-2026-41364 is a symlink following vulnerability (CWE-59) affecting OpenClaw versions prior to 2026.3.31. The issue resides in the SSH sandbox tar upload functionality, where the software fails to properly handle symlinks within uploaded tar archives. This allows remote attackers to craft malicious archives that escape the intended sandbox boundaries and overwrite arbitrary files on the remote host. The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H), indicating high severity due to its potential for significant integrity and availability impacts.

Attackers require low privileges, such as those granted to a legitimate SSH user, to exploit this vulnerability over the network with low complexity and no user interaction. By uploading a specially crafted tar archive containing symlinks, an attacker can direct the extraction process to follow those links outside the sandbox, enabling arbitrary file writes on the host system. Successful exploitation could lead to overwriting critical configuration files, binaries, or data, potentially resulting in denial of service, privilege escalation, or persistence mechanisms.

Mitigation is addressed in the OpenClaw GitHub repository via commit 3d5af14984ac1976c747a8e11581d697bd0829dc, which resolves the issue in version 2026.3.31 and later. Security advisories from GitHub (GHSA-fv94-qvg8-xqpw) and Vulncheck detail the vulnerability and recommend upgrading to the patched version, along with general best practices such as restricting upload capabilities and validating tar contents for symlinks in sandboxed environments.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.3.31

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

The symlink following vulnerability in the SSH sandbox tar upload enables low-privileged remote attackers to overwrite arbitrary files, directly facilitating exploitation of remote services (T1210) and privilege escalation via file manipulation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References