CVE-2026-41383: OpenClaw Arbitrary Directory Deletion Flaw Exposes Remote Data
The National Vulnerability Database has detailed CVE-2026-41383, a critical arbitrary directory deletion vulnerability impacting OpenClaw versions prior to 2026.4.2. Attackers can exploit this flaw in mirror mode by manipulating remoteWorkspaceDir and remoteAgentWorkspaceDir configuration settings. This manipulation allows them to delete unintended directories on remote systems, replacing their contents with uploaded workspace data.
The CVSS score of 8.1 highlights the severity, with the vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H indicating a High impact for Integrity and Availability, accessible over the network with low complexity and requiring only low privileges. This is a classic CWE-22 path traversal vulnerability, but with a destructive twist.
Defenders must prioritize patching OpenClaw instances to version 2026.4.2 or later. For organizations unable to patch immediately, rigorous auditing of OpenClaw configurations, particularly remote directory settings, is paramount. Limiting administrative access to these configurations and monitoring for unusual file deletion or synchronization activities on remote workspaces will be key to early detection.
What This Means For You
- If your organization uses OpenClaw, verify that you are running version 2026.4.2 or higher. If not, schedule an immediate upgrade. Review your `remoteWorkspaceDir` and `remoteAgentWorkspaceDir` configurations for any suspicious or unauthorized changes and implement stricter access controls on these settings.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-41383: OpenClaw Mirror Mode Arbitrary Directory Deletion
title: CVE-2026-41383: OpenClaw Mirror Mode Arbitrary Directory Deletion
id: scw-2026-04-28-ai-1
status: experimental
level: critical
description: |
Detects the execution of OpenClaw in mirror or sync mode, which is the core functionality exploited by CVE-2026-41383. This rule aims to identify potential attempts to trigger the arbitrary directory deletion vulnerability by observing the specific command-line arguments used by OpenClaw.
author: SCW Feed Engine (AI-generated)
date: 2026-04-28
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-41383/
tags:
- attack.defense_evasion
- attack.t1070.004
logsource:
category: process_creation
detection:
selection:
Image|contains:
- 'OpenClaw.exe'
CommandLine|contains:
- 'mirror'
- 'sync'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41383 | Arbitrary Directory Deletion | OpenClaw before 2026.4.2 |
| CVE-2026-41383 | Misconfiguration | Manipulation of remoteWorkspaceDir and remoteAgentWorkspaceDir configuration values in OpenShell |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 28, 2026 at 22:37 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.