Description
OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in apply_patch that allows attackers to write or delete files outside the configured workspace directory. When apply_patch is enabled without filesystem sandbox containment, attackers can exploit crafted paths including directory traversal sequences or absolute paths to escape workspace boundaries and modify arbitrary files.
INFO
Published Date :
2026-03-11T13:32:33.790Z
Last Modified :
2026-03-11T14:42:06.135Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2026-32060 vulnerability.
| Vendors | Products |
|---|---|
| Openclaw |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-32060.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact