Impact
OpenClaw versions prior to 2026.2.24 contain an improper path validation vulnerability in sandboxed media handling. Attackers can supply malicious media references that resolve to absolute paths within the host’s temporary directory but outside the intended sandbox root. The flaw allows reading and exfiltrating arbitrary files from that temporary directory, compromising confidentiality and potentially exposing sensitive data. The weakness is classified as CWE‑22 (Path Traversal).
Affected Systems
The vulnerability affects the OpenClaw application (cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*). All releases dated before 2026.2.24 are impacted; upgrading to 2026.2.24 or later removes the flaw.
Risk and Exploitability
The CVSS base score is 7.1, indicating a high risk. No EPSS score is currently available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector involves an attacker sending a crafted media attachment to the application, which leads to the sandbox incorrectly resolving the path and reading host files. Because the flaw exploits local temporary directories, it may be easier for an attacker who can interact with the application’s media processing features.
OpenCVE Enrichment
Github GHSA