Impact
OpenClaw before 2026.3.31 contains a self‑whitelisting flaw in the appendLocalMediaParentRoots function that enables a model to read any file on the host system without authorization. The flaw results from inadequate validation of media parent directories, allowing an attacker to extract credentials or other confidential data. This is a CWE‑732 type weakness where permissions or controls are improperly assigned.
Affected Systems
The vulnerability affects OpenClaw releases older than version 2026.3.31. Systems running those releases are at risk if they enable external model loading or media management features.
Risk and Exploitability
The CVSS score of 6.0 indicates a moderate severity vulnerability. No EPSS data is available, and the issue is not listed in the CISA KEV catalog, suggesting no confirmed exploitation yet. The attack is likely performed by a malicious model or via an application component that processes media requests, resulting in an arbitrary file read on the host. The lack of publicly known exploitation means the threat remains theoretical but could be leveraged in a targeted environment.
OpenCVE Enrichment