Time-of-Check/Time-of-Use Race Condition in OpenClaw by OpenClaw
CVE-2026-44112

6MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
6 May 2026

What is CVE-2026-44112?

OpenClaw versions prior to 2026.4.22 exhibit a vulnerability characterized by a time-of-check/time-of-use race condition within the OpenShell sandbox filesystem mechanisms. This flaw allows malicious actors to exploit symlink swaps during filesystem operations, potentially enabling unauthorized write access outside of the predefined mount root. By bypassing sandbox restrictions through this weakness, attackers can manipulate filesystem writes, leading to potential data exposure or integrity compromises.

Affected Version(s)

OpenClaw 0 < 2026.4.22

OpenClaw 2026.4.22

References

CVSS V4

Score:
6
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

vladimir tokarev (@VladimirEliTokarev)
.