Impact
OpenClaw versions 2026.2.6 through 2026.3.24 contain a path traversal flaw in the Feishu extension’s resolveUploadInput function that bypasses the file‑system sandbox. By manipulating the upload_image parameter attackers can resolve file paths that reference locations outside the defined localRoots, enabling them to read any file accessible to the OpenClaw process. The vulnerability primarily threatens confidentiality; it does not provide a vector for code execution or denial of service.
Affected Systems
The affected product is OpenClaw from the vendor OpenClaw. Versions from 2026.2.6 up to and including 2026.3.24 are vulnerable. The application runs on a Node.js environment, as indicated by the CPE information, but the CVE does not list additional platform constraints.
Risk and Exploitability
The CVSS score of 6.0 indicates a medium‑severity flaw. EPSS is not available and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is through a Feishu integration that accepts upload_image requests; an attacker who can influence or supply the upload_image payload can trigger the path traversal and retrieve arbitrary files. Because the flaw allows reading files rather than executing code, the risk is limited to information disclosure, but it could be leveraged in a broader attack chain if sensitive data are exposed.
OpenCVE Enrichment