<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-41383 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-41383/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-41383/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Arbitrary Directory Deletion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-directory-deletion/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-directory-deletion/</guid><description>OpenClaw before 2026.4.2 is vulnerable to arbitrary directory deletion in mirror mode, enabling attackers to delete remote directories by manipulating remoteWorkspaceDir and remoteAgentWorkspaceDir configuration values.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.4.2 is susceptible to an arbitrary directory deletion vulnerability (CVE-2026-41383) when operating in mirror mode. An attacker with control over the OpenShell configuration paths, specifically <code>remoteWorkspaceDir</code> and <code>remoteAgentWorkspaceDir</code>, can trigger the deletion of unintended remote directory contents. This is achieved by manipulating these configuration values to point to sensitive directories. The subsequent mirror sync operation replaces the deleted contents with data from the attacker&rsquo;s workspace, leading to data loss and potential system compromise. This vulnerability allows an attacker to potentially wipe out important data on the remote end.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains access to the OpenClaw configuration.</li>
<li>The attacker modifies the <code>remoteWorkspaceDir</code> and/or <code>remoteAgentWorkspaceDir</code> configuration values to point to a target directory they wish to delete.</li>
<li>The attacker initiates a mirror sync operation.</li>
<li>OpenClaw, using the attacker-controlled path, connects to the remote system.</li>
<li>OpenClaw deletes the contents of the directory specified by the modified <code>remoteWorkspaceDir</code> or <code>remoteAgentWorkspaceDir</code>.</li>
<li>OpenClaw uploads the contents of the attacker&rsquo;s local workspace to the now-empty remote directory, effectively replacing the original data.</li>
<li>The targeted remote directory now contains the attacker&rsquo;s data instead of the original contents.</li>
<li>The attacker achieves arbitrary directory deletion and data replacement, potentially causing significant disruption and data loss.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to arbitrary deletion of files and directories on the remote system where OpenClaw is used in mirror mode. The impact includes potential data loss, service disruption, and the replacement of legitimate data with attacker-controlled content. Given the CVSS v3.1 score of 8.1, this vulnerability is considered high severity due to the potential for significant data integrity and availability impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.2 or later to remediate CVE-2026-41383.</li>
<li>Monitor OpenClaw configuration files for unauthorized modifications to <code>remoteWorkspaceDir</code> and <code>remoteAgentWorkspaceDir</code> using a file integrity monitoring system.</li>
<li>Implement strict access controls to OpenClaw configuration files to prevent unauthorized modification of these settings.</li>
<li>Deploy the Sigma rule to detect suspicious process execution related to modification of openclaw configuration files.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-41383</category><category>directory-traversal</category><category>file-deletion</category><category>openclaw</category></item></channel></rss>