Impact
OpenClaw versions 2026.4.7 through 2026.4.14 allow attackers to supply malicious tool‑result media references that bypass local‑root containment checks, enabling arbitrary reads of local files or UNC network paths. This flaw is a classic file‑path traversal (CWE‑73) where an attacker can retrieve sensitive data such as configuration files or credentials. The vulnerability does not require elevated privileges; any user capable of sending a crafted media reference to the application can potentially trigger the file read.
Affected Systems
The affected product is OpenClaw, a Node.js‑based application. Versions before 2026.4.15, notably 2026.4.7 to 2026.4.14, are impacted. The bug exists in the media path handling module that resolves tool‑result media references against the local filesystem.
Risk and Exploitability
The CVSS score of 6.3 indicates a moderate severity, pointing to a confidentiality risk. EPSS is not available, so the likelihood of exploitation cannot be quantified, and the flaw is not listed in CISA’s KEV catalog. The likely attack vector appears to be local or remote submission of malicious media paths; the flaw does not require authentication beyond access to the vulnerable interface. Given the potential to read arbitrary files, it poses a tangible risk of sensitive information disclosure if employed by an adversary.
OpenCVE Enrichment