Summary
The public gateway agent RPC allowed an authenticated operator with operator.write to supply attacker-controlled spawnedBy and workspaceDir values. That let the caller re-root the agent run outside its configured workspace boundary.
Impact
A non-owner operator could escape the intended workspace boundary and run normal file and exec tools from an arbitrary process-accessible directory.
Affected versions
openclaw <= 2026.3.8
Patch
Fixed in openclaw 2026.3.11 and included in later releases such as 2026.3.12. The gateway now enforces the configured workspace boundary for agent runs regardless of caller-supplied overrides.
References
Summary
The public gateway
agentRPC allowed an authenticated operator withoperator.writeto supply attacker-controlledspawnedByandworkspaceDirvalues. That let the caller re-root the agent run outside its configured workspace boundary.Impact
A non-owner operator could escape the intended workspace boundary and run normal file and exec tools from an arbitrary process-accessible directory.
Affected versions
openclaw<= 2026.3.8Patch
Fixed in
openclaw2026.3.11and included in later releases such as2026.3.12. The gateway now enforces the configured workspace boundary for agent runs regardless of caller-supplied overrides.References