Time-of-Check-Time-of-Use Vulnerability in OpenClaw by OpenClaw
CVE-2026-41338

4.3MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
23 April 2026

What is CVE-2026-41338?

OpenClaw versions before 2026.3.31 are susceptible to a time-of-check-time-of-use vulnerability within its sandbox file operations. This flaw enables attackers to exploit the check-then-act race condition, particularly during the apply_patch, remove, and mkdir operations. By bypassing file descriptor-based defenses, malicious actors can manipulate files between the validation and execution stages, potentially leading to unauthorized file modifications and security breaches.

Affected Version(s)

OpenClaw 0 < 2026.3.31

OpenClaw 2026.3.31

References

CVSS V4

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
Low
Attack Vector:
Local
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

AntAISecurityLab
.