'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2026-03-25 | |
| Rule Name: | OpenClaw Path Traversal Vulnerability (CVE-2026-28462) | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | OpenClaw versions prior to 2026.2.13 contain a vulnerability in the browser control API in which it accepts user-supplied output paths for trace and download files without consistently constraining writes to temporary directories. Attackers with API access can exploit path traversal in POST /trace/stop, POST /wait/download, and POST /download endpoints to write files outside intended temp roots. | |
| Impact: | An attacker could exploit this vulnerability to have unspecified effect. | |
| Affected OS: | Windows, Linux, Others | |
| Reference: | https://github.com/openclaw/openclaw/security/advisories/GHSA-gq9c-wg68-gwj2 |
|
| Solutions |
|---|
| Please refer to announcements or patches release by the vendor: https://github.com/openclaw/openclaw/releases |