LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-32013

CVE-2026-32013 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: March 20, 2026

OpenClaw - Path Traversal

Published: March 19, 2026Updated: March 20, 2026Remote Exploitable

Overview

OpenClaw < 2026.2.25 contains a symlink traversal vulnerability in agents.files.get and agents.files.set methods, letting attackers read/write files outside the agent workspace and potentially execute code via file overwrite.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 7.6%(Probability of exploitation in next 30 days)

Impact

Attackers can read/write arbitrary host files and potentially execute code, leading to full system compromise within gateway process permissions.

Mitigation

Update to version 2026.2.25 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 19, 2026

🟠 CVE-2026-32013 - High (8.8) OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted file... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-32013/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-32013
Severity
High
CVSS Score
8.8
Type
path_traversal
Status
unconfirmed
EPSS
7.6%
Social Posts
1

CWE

  • CWE-59

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS Score

7.6%Probability of exploitation in the next 30 days