Lyrie
Critical CVE
CVSS 9.63 sources verified·1 min read
By Lyrie Threat Intelligence·5/13/2026

CRITICAL: CVE-2026-44112 (CVSS 9.6) — openclaw openclaw

CVE: CVE-2026-44112

CVSS: 9.6 (3.1) — CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H

Severity: CRITICAL

Status: Critical advisory

Affected

  • openclaw openclaw

Summary

OpenClaw before 2026.4.22 contains a time-of-check/time-of-use race condition in OpenShell sandbox filesystem writes that allows attackers to redirect writes outside the intended mount root. Attackers can exploit symlink swaps during filesystem operations to bypass sandbox restrictions and write files outside the local mount root.

Verified Sources

References

  • https://github.com/openclaw/openclaw/commit/7be82d4fd1193bcb7e44ee38838f00bf924ffa76
  • https://github.com/openclaw/openclaw/security/advisories/GHSA-wppj-c6mr-83jj
  • https://www.vulncheck.com/advisories/openclaw-symlink-swap-race-condition-in-openshell-fs-bridge-writes

_Validated by the Lyrie Threat Intelligence Pipeline — 3 independent sources confirmed before publication. No speculation._

Lyrie Verdict

A vulnerability of this severity is exactly what Lyrie's anti-rogue-AI defense is built for: continuous, autonomous monitoring that doesn't wait for human reaction time.

Validated sources

  1. [1]NVD
  2. [2]GitHub Advisory
  3. [3]MITRE