Impact
OpenClaw versions prior to 2026.4.8 are vulnerable to a filesystem policy bypass during docx upload processing. The flaw allows maliciously crafted documents to be uploaded via the upload_file and upload_image endpoints, enabling attackers to read files located outside the intended workspace directory. This path traversal weakness (CWE-22) exposes the confidentiality of system files accessible to the Web server, potentially revealing sensitive information such as configuration files or credentials. The impact is limited to file read, not exploitation of arbitrary code execution, but it can compromise application confidentiality and trust.
Affected Systems
The affected product is OpenClaw by OpenClaw. Any deployment using a release before 2026.4.8 is impacted. No further version granularity is provided in the CNA data.
Risk and Exploitability
The CVSS score of 6.0 indicates moderate severity. No EPSS score is available, and the vulnerability is not listed in CISA's KEV catalog, suggesting no known exploitation activity at the time of reporting. The attack likely requires an attacker to upload a malicious docx file to either upload_file or upload_image. Successful exploitation would allow reading arbitrary local files, potentially compromising confidentiality. Patch availability and installation are the most effective mitigation measures.
OpenCVE Enrichment