<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-33572 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-33572/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 29 Mar 2026 13:17:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-33572/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Insufficient File Permissions Vulnerability (CVE-2026-33572)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-file-permissions/</link><pubDate>Sun, 29 Mar 2026 13:17:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-file-permissions/</guid><description>OpenClaw before 2026.2.17 creates session transcript JSONL files with overly broad default permissions, allowing local users to read transcript contents and extract sensitive information.</description><content:encoded>&lt;p>OpenClaw before version 2026.2.17 is vulnerable to an insufficient file permissions issue. The application creates session transcript JSONL files with overly permissive default access controls. This vulnerability allows local users to read these transcript files, potentially exposing sensitive information such as secrets, API keys, passwords, or other confidential data that might be present in tool outputs or commands executed during a session. The vulnerability is identified as CVE-2026-33572…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-33572</category><category>file-permissions</category><category>credential-access</category></item></channel></rss>