Time-of-Check/Time-of-Use Race Condition in OpenClaw by OpenClaw
CVE-2026-44113
6MEDIUM
What is CVE-2026-44113?
Recent vulnerabilities in OpenClaw prior to version 2026.4.22 expose users to significant risks through a time-of-check/time-of-use race condition within the OpenShell filesystem bridge. This flaw permits attackers to manipulate symlink swaps during filesystem operations, potentially allowing them to breach sandbox restrictions and gain unauthorized access to sensitive files. Specifically, the vulnerability enables the reading of files beyond the scope of the intended mount root, putting critical data at risk.
Affected Version(s)
OpenClaw 0 < 2026.4.22
OpenClaw 2026.4.22
References
CVSS V4
Score:
6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
vladimir tokarev (@VladimirEliTokarev)
