Skip to content
Threat Feed
medium advisory

OpenClaw Insufficient File Permissions Vulnerability (CVE-2026-33572)

OpenClaw before 2026.2.17 creates session transcript JSONL files with overly broad default permissions, allowing local users to read transcript contents and extract sensitive information.

OpenClaw before version 2026.2.17 is vulnerable to an insufficient file permissions issue. The application creates session transcript JSONL files with overly permissive default access controls. This vulnerability allows local users to read these transcript files, potentially exposing sensitive information such as secrets, API keys, passwords, or other confidential data that might be present in tool outputs or commands executed during a session. The vulnerability is identified as CVE-2026-33572…

Detection coverage 2

Detect Unauthorized Access to OpenClaw Session Transcripts

high

Detects unauthorized processes accessing OpenClaw session transcript files, indicating potential exploitation of CVE-2026-33572.

sigma tactics: credential_access techniques: T1003 sources: file_event, linux

Detect File Creation With Overly Permissive Permissions

medium

Detects files created with overly permissive permissions (world-readable) which may expose sensitive information.

sigma tactics: credential_access techniques: T1003 sources: file_event, linux

Detection queries are kept inside the platform. Get full rules →

Indicators of compromise

1

email

3

url