Plattform
nodejs
Komponente
openclaw
Behoben in
2026.2.14
CVE-2026-28453 describes a Path Traversal vulnerability discovered in OpenClaw. This flaw allows attackers to manipulate TAR archive extraction paths, potentially leading to unauthorized file writes and subsequent system compromise. The vulnerability impacts OpenClaw versions prior to 2026.2.14, and a patch has been released to address the issue.
The core of this vulnerability lies in OpenClaw's inadequate validation of TAR archive entry paths during extraction. An attacker can craft a specially designed TAR archive containing traversal sequences, such as ../../, to escape the intended extraction directory. This allows them to write files to arbitrary locations on the system, potentially overwriting critical configuration files or injecting malicious code. Successful exploitation could lead to complete system compromise, including unauthorized access, data theft, and remote code execution. The impact is amplified if OpenClaw is deployed in environments with sensitive data or critical infrastructure.
CVE-2026-28453 was publicly disclosed on 2026-03-05. There is no indication of active exploitation campaigns at this time. The vulnerability is not currently listed on the CISA KEV catalog. Public proof-of-concept exploits are not widely available, but the vulnerability's nature makes it likely that such exploits will emerge if the vulnerability remains unpatched in exposed systems.
Systems running OpenClaw versions 0 through 2026.2.14 are at risk, particularly those that process untrusted TAR archives. Environments where OpenClaw is used to process user-uploaded files or data from external sources are especially vulnerable.
disclosure
Exploit-Status
EPSS
0.08% (24% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-28453 is to immediately upgrade OpenClaw to version 2026.2.14 or later. If upgrading is not immediately feasible due to compatibility concerns or system downtime requirements, consider implementing strict input validation on TAR archives before processing them. This could involve whitelisting allowed filenames or using a secure archive extraction library that automatically handles path traversal prevention. Additionally, monitor system logs for unusual file creation activity, particularly in sensitive directories. After upgrading, confirm the fix by attempting to extract a malicious TAR archive containing traversal sequences and verifying that the extraction is denied.
Actualice la biblioteca OpenClaw a la versión 2026.2.14 o posterior. Esto corrige la vulnerabilidad de path traversal al validar correctamente las rutas de entrada de los archivos TAR durante la extracción.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-28453 is a Path Traversal vulnerability in OpenClaw versions 0–2026.2.14 that allows attackers to write files outside the intended directory via malicious TAR archives, potentially leading to code execution.
You are affected if you are running OpenClaw versions 0 through 2026.2.14 and process TAR archives, especially those from untrusted sources.
Upgrade OpenClaw to version 2026.2.14 or later. If immediate upgrade is not possible, implement strict input validation on TAR archives.
As of now, there are no confirmed reports of active exploitation, but the vulnerability's severity warrants immediate attention and remediation.
Refer to the official OpenClaw security advisories on their website or GitHub repository for the most up-to-date information and guidance.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.