CVE-2026-41296: OpenClaw Sandbox Escape via TOCTOU Race — What You Need to Know

April 22, 2026 · ClawReady Team

A HIGH severity CVE was published on April 20 for OpenClaw. CVE-2026-41296 is a time-of-check-time-of-use (TOCTOU) race condition in the remote filesystem bridge that allows sandbox escape — meaning an attacker with low privileges can read arbitrary files outside the intended sandbox boundary.

If you're running OpenClaw before version 2026.3.31, patch now.

CVE details

What the vulnerability is

The bug lives in the remote filesystem bridge's readFile function. The problem is a classic TOCTOU pattern: OpenClaw validates the file path at one point in time, then performs the actual file read as a separate operation. Between those two steps — the check and the use — an attacker can swap out the path target to point to a file outside the sandbox.

In practice: an attacker with low-level access (a plugin, a skill, or a crafted request that reaches the remote filesystem bridge) can race the check-to-read window to read arbitrary files on the host system. Environment files, key stores, config files, secrets — anything readable by the OpenClaw process is potentially accessible.

Who is affected

OpenClaw 2026.3.31 and all later releases (4.x) are patched. If you've been keeping up with updates, you're already covered. If you've been holding on an older version, this is the reason to update.

How to verify your version

openclaw --version

If the output is earlier than 2026.3.31, you're vulnerable. Update immediately:

npm install -g openclaw@latest

Or if using npm with a prefix:

npm install -g --prefix ~/.npm-global openclaw@latest

Immediate mitigations if you can't update

If updating right now isn't possible:

  1. Disable the remote filesystem bridge in your gateway config if you don't need it
  2. Restrict plugin/skill permissions — only run trusted, reviewed skills
  3. Monitor logs for anomalous readFile calls or 4xx/5xx spikes on the remote bridge endpoint
  4. Audit your environment files — know what's readable by the OpenClaw process and reduce exposure where possible

References

ClawReady's posture

All ClawReady-configured setups should already be running 4.x (well past the 3.31 fix). If you had a ClawReady setup done before March 31 and haven't updated since, run the version check above. If you're unsure about your exposure, ClawReady's security audit tier covers exactly this: version verification, bridge configuration review, and permission hardening.