GHSA-V892-HWPG-JWQP: Zip Slip Path Traversal in OpenClaw Archive Extraction
Vulnerability ID: GHSA-V892-HWPG-JWQP
CVSS Score: 8.8
Published: 2026-03-02
A critical Zip Slip vulnerability exists in OpenClaw versions prior to 2026.2.14. The application's archive extraction mechanism failed to properly validate entry paths within ZIP and TAR archives, allowing malicious actors to write arbitrary files to the filesystem outside the intended destination directory. This flaw affects the skill installation process and internal asset management, potentially leading to Remote Code Execution (RCE) via configuration or executable overwrite.
TL;DR
OpenClaw prior to v2026.2.14 contains a Zip Slip vulnerability in its skill installation logic. Attackers can craft malicious archives with directory traversal sequences (e.g., ../../) to overwrite critical system files when the archive is extracted. This can result in arbitrary code execution or system compromise.
Technical Details
- CWE ID: CWE-22
- Attack Vector: Network / Local (User Interaction)
- Impact: Arbitrary File Write / RCE
- Severity: High
- Exploit Status: PoC Available
- Platform: Node.js
Affected Systems
- OpenClaw (NPM Package)
-
openclaw: < 2026.2.14 (Fixed in:
2026.2.14)
Code Analysis
Commit: 3aa94af
Fix Zip Slip vulnerability and harden archive extraction logic
Mitigation Strategies
- Update OpenClaw to version 2026.2.14 or later immediately.
- Run OpenClaw with the least privilege necessary (avoid root).
- Use containerization (Docker) with read-only root filesystems where possible.
Remediation Steps:
- Stop the OpenClaw service.
- Run
npm update openclaworyarn upgrade openclawto pull the latest version. - Verify the installed version is >= 2026.2.14 using
npm list openclaw. - Audit the filesystem for unexpected files, particularly in sensitive directories like
.sshor system binary folders, if a compromise is suspected.
References
Read the full report for GHSA-V892-HWPG-JWQP on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)