Impact
OpenClaw before version 2026.3.24 permits a path traversal flaw in sandbox enforcement. Unnormalized mediaUrl or fileUrl parameters are accepted without proper validation, and the sandbox lacks a mediaLocalRoots context. This allows an attacker to read files outside the intended sandbox, including sensitive API keys and configuration data, resulting in a breach of confidentiality. The weakness is identified as CWE‑22.
Affected Systems
Vulnerable systems are installations of OpenClaw using any version prior to 2026.3.24. The affected component is the sandbox media handling module in the OpenClaw application.
Risk and Exploitability
The vulnerability scores a CVSS score of 7.1, indicating a high severity level. No EPSS data is available, but the flaw is not listed in the CISA KEV catalog. The likely attack vector is an HTTP request to a sandboxed agent with crafted mediaUrl or fileUrl parameters; the attacker must have network access to the agent to execute the exploit. Given the lack of additional constraints in the description, exploitation is considered feasible for a user with access to the target asset.
OpenCVE Enrichment
Github GHSA