Description
OpenClaw before 2026.3.22 contains a path traversal vulnerability in Windows media loaders that accepts remote-host file URLs and UNC-style paths before local-path validation. Attackers can exploit this by providing network-hosted file targets that are treated as local content, bypassing intended access restrictions.
Published: 2026-04-01
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized local file access
Action: Patch Immediately
AI Analysis

Impact

The vulnerability is a path traversal flaw in the Windows media loaders of OpenClaw. It accepts remote-host file URLs and UNC-style paths before validating them as local paths, allowing an attacker to supply a network-hosted file that the loader treats as local content. This can enable unauthorized access to files or potentially execution of local resources depending on how the application handles the retrieved media.

Affected Systems

All instances of OpenClaw version earlier than 2026.3.22 that run on Windows and use the media loader component that processes external media URLs are affected.

Risk and Exploitability

The CVSS score of 6.9 signals moderate severity. Detailed exploitation probability metrics are not publicly available, and the vulnerability is not listed in the CISA known exploited vulnerabilities catalog. The attack requires the ability to supply a remote-host file URL or UNC path that the application will load; an attacker could host a malicious file on a network share or external HTTP server and point the application to that URL. If the application treats the data as local content, the attacker may gain unauthorized file access or compromise application integrity.

Generated by OpenCVE AI on April 2, 2026 at 05:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OpenClaw to version 2026.3.22 or newer.
  • If an immediate update is not possible, restrict the media loader from accepting remote-host file URLs and UNC-style paths.
  • Monitor logs for attempts to load media from remote sources and investigate any anomalies.

Generated by OpenCVE AI on April 2, 2026 at 05:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.22 contains a path traversal vulnerability in Windows media loaders that accepts remote-host file URLs and UNC-style paths before local-path validation. Attackers can exploit this by providing network-hosted file targets that are treated as local content, bypassing intended access restrictions.
Title OpenClaw < 2026.3.22 - Remote File URL Acceptance in Windows Media Loaders
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-41
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-01T17:54:31.837Z

Reserved: 2026-03-30T13:51:47.549Z

Link: CVE-2026-34510

cve-icon Vulnrichment

Updated: 2026-04-01T17:53:56.795Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T16:23:50.567

Modified: 2026-04-07T19:21:54.167

Link: CVE-2026-34510

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:17:23Z

Weaknesses