CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



GHSA-V892-HWPG-JWQP
8.8

GHSA-V892-HWPG-JWQP: Zip Slip Path Traversal in OpenClaw Archive Extraction

Alon Barad
Alon Barad
Software Engineer

Mar 3, 2026·5 min read·5 visits

No Known Exploit

Executive Summary (TL;DR)

OpenClaw prior to v2026.2.14 contains a Zip Slip vulnerability in its skill installation logic. Attackers can craft malicious archives with directory traversal sequences (e.g., `../../`) to overwrite critical system files when the archive is extracted. This can result in arbitrary code execution or system compromise.

A critical Zip Slip vulnerability exists in OpenClaw versions prior to 2026.2.14. The application's archive extraction mechanism failed to properly validate entry paths within ZIP and TAR archives, allowing malicious actors to write arbitrary files to the filesystem outside the intended destination directory. This flaw affects the skill installation process and internal asset management, potentially leading to Remote Code Execution (RCE) via configuration or executable overwrite.

Vulnerability Overview

OpenClaw is an open-source personal AI assistant that supports modular extensions through skills, plugins, and internal tools. A security assessment revealed a critical Arbitrary File Write vulnerability, commonly known as 'Zip Slip', within the application's archive extraction routines. This mechanism is primarily used when the application downloads and installs external assets, such as community skills or tools like signal-cli.

The vulnerability arises because the extraction logic blindly trusts the file paths specified within archive entries. When OpenClaw unpacks a compressed file (ZIP or TAR), it constructs the destination path by concatenating the target directory with the entry's name. If an attacker crafts an archive entry with a name like ../../../../root/.ssh/authorized_keys, the application writes the file content to that resolved path, bypassing the intended sandbox directory.

Simultaneously, related path traversal issues were identified in the Browser Tool component. The /hooks/file-chooser endpoint lacked path confinement for uploads, and the download manager accepted suggested filenames containing traversal sequences, further expanding the attack surface for local file system manipulation.

Root Cause Analysis

The root cause of this vulnerability is the absence of canonical path validation during the file extraction process. This falls under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory).

In a secure extraction implementation, the application must perform the following steps for every entry in an archive:

  1. Decode the entry name.
  2. Resolve the full destination path (Base Directory + Entry Name).
  3. Normalize the resulting path to remove relative segments (. and ..).
  4. Verify that the normalized path still begins with the Base Directory path.

OpenClaw failed to implement step 4. Specifically, the extraction logic utilized unzip (or JS equivalents) and tar commands without flags or logic to strip directory components or validate the final destination. Consequently, the filesystem APIs treated the traversal sequences as valid instructions to navigate up the directory tree, allowing files to escape the targetDir confinement.

Code Analysis: Fix Implementation

The vulnerability was remediated in version 2026.2.14 by introducing a centralized, secure extraction utility in infra/archive.ts. The patch replaces the insecure extraction calls with a validation routine that strictly enforces path confinement.

The following code snippet demonstrates the logic used to validate archive entries before writing them to disk. It normalizes paths and explicitly checks for traversal attempts:

// src/infra/archive.ts (Patched Logic)
 
function validateArchiveEntryPath(entryPath: string, targetDir: string): void {
  // 1. Normalize separators to forward slashes
  // 2. Normalize relative segments (collapsing '..')
  const normalized = path.posix.normalize(entryPath.replaceAll("\\", "/"));
 
  // Check 1: Prevent immediate traversal indicators
  if (normalized === ".." || normalized.startsWith("../")) {
    throw new Error(`Security Violation: Archive entry escapes destination: ${entryPath}`);
  }
 
  // Check 2: Prevent absolute paths
  if (path.posix.isAbsolute(normalized)) {
    throw new Error(`Security Violation: Archive entry is absolute: ${entryPath}`);
  }
 
  // Check 3: Symlink and Hardlink restriction (Pseudo-code for logic)
  // The patch also rejects entries identified as symlinks or hardlinks 
  // to prevent 'Symlink Slip' attacks.
}

Additionally, the patch enforces strict directory confinement for other file operations. Downloads are now locked to /tmp/openclaw/downloads, and uploads are restricted to /tmp/openclaw/uploads, ensuring that temporary file operations cannot impact the host OS configuration.

Exploitation Methodology

To exploit this vulnerability, an attacker must induce the OpenClaw application to extract a malicious archive. This is typically achieved by distributing a compromised 'skill' or plugin via a community repository or by manipulating a download URL if the attacker has a Man-in-the-Middle (MitM) position or control over an update server.

Attack Scenario:

  1. Archive Creation: The attacker creates a ZIP file containing a payload (e.g., a reverse shell script or a new SSH key).
  2. Path Manipulation: The attacker modifies the internal filename of the payload to ../../../../../../bin/malicious_script.sh.
  3. Delivery: The attacker publishes this archive as a new OpenClaw skill.
  4. Execution: The victim runs openclaw skills install <malicious-skill>.
  5. Extraction: OpenClaw downloads the ZIP and extracts it. The extractor follows the directory traversal path and writes malicious_script.sh to the system's /bin directory, overwriting any existing file or creating a new one.

Due to the permissions typically required by OpenClaw to manage system tools, the overwritten files often execute with high privileges, leading to immediate system compromise.

Impact Assessment

The impact of this vulnerability is rated as High. The ability to write arbitrary files to the filesystem provides attackers with multiple avenues to achieve Remote Code Execution (RCE).

  • System Compromise: Overwriting ~/.ssh/authorized_keys allows direct SSH access.
  • Persistence: Injecting malicious scripts into startup folders or .bashrc ensures code execution upon user login.
  • Denial of Service: Overwriting critical system binaries or libraries can render the host operating system unstable or unbootable.
  • Data Integrity: Configuration files for OpenClaw or other applications can be modified to disable security controls or redirect data.

The vulnerability is particularly dangerous in environments where OpenClaw runs with elevated privileges or in containerized environments where the container filesystem is not read-only.

Fix Analysis (1)

Technical Appendix

CVSS Score
8.8/ 10

Affected Systems

OpenClaw (NPM Package)

Affected Versions Detail

Product
Affected Versions
Fixed Version
openclaw
OpenClaw
< 2026.2.142026.2.14
AttributeDetail
CWE IDCWE-22
Attack VectorNetwork / Local (User Interaction)
ImpactArbitrary File Write / RCE
SeverityHigh
Exploit StatusPoC Available
PlatformNode.js

MITRE ATT&CK Mapping

T1083File and Directory Discovery
Discovery
T1204.002User Execution: Malicious File
Execution
T1485Data Destruction
Impact

Vulnerability Timeline

Vulnerability Discovered
2026-02-01
Patch Merged (Commit 3aa94af)
2026-02-14
Advisory Published
2026-02-14

References & Sources

  • [1]GHSA-V892-HWPG-JWQP Advisory
  • [2]Patch Commit
  • [3]Pull Request #16203