#VU125170 UNIX symbolic link following in OpenClaw
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a local user to append attacker-controlled content to arbitrary files on the system.
The vulnerability exists due to unix symbolic link following in agents.create and agents.update handlers when appending to IDENTITY.md in the agent workspace. A local user can place a symlink at the IDENTITY.md path and invoke the affected API methods to append attacker-controlled content to arbitrary files on the system.
The issue occurs because an existing symlink at the IDENTITY.md path is not prevented from being followed during the append operation.