Impact
OpenClaw versions before 2026.3.31 allow attackers to manipulate inbound channel attachment paths in ACP dispatch and read arbitrary files outside the intended directories. This path traversal flaw (CWE-22) lets remote users bypass attachment-cache and root directory checks, potentially exposing confidential or system files.
Affected Systems
The vulnerability affects OpenClaw installations using the ACP dispatch module in any Node.js based deployment. All releases prior to 2026.3.31 are vulnerable, regardless of the specific environment or configuration.
Risk and Exploitability
The CVSS score of 7.1 indicates medium to high severity. While an EPSS score is not provided, the attack requires only the ability to send crafted inbound messages and does not rely on authentication, suggesting that exploitation could occur from any network that can reach the ACP endpoint. The vulnerability is not listed in the CISA KEV catalog, but its remote nature and lack of defenses make it a significant risk for exposed deployments.
OpenCVE Enrichment