OpenClaw before 2026.2.17 creates session transcript JSONL files with overly broad default permissions, allowing local users to read transcript contents. Attackers with local access can read transcript files to extract sensitive information including secrets from tool output.
Metrics
Affected Vendors & Products
References
History
Sun, 29 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.2.17 creates session transcript JSONL files with overly broad default permissions, allowing local users to read transcript contents. Attackers with local access can read transcript files to extract sensitive information including secrets from tool output. | |
| Title | OpenClaw < 2026.2.17 - Insufficient File Permissions in Session Transcript Files | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-378 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-03-29T12:44:30.369Z
Updated: 2026-03-29T12:44:30.369Z
Reserved: 2026-03-23T11:00:48.407Z
Link: CVE-2026-33572
No data.
Status : Received
Published: 2026-03-29T13:17:02.770
Modified: 2026-03-29T13:17:02.770
Link: CVE-2026-33572
No data.