Impact
OpenClaw before 2026.4.9 contains a file read vulnerability that enables attackers to bypass navigation guards using browser act/evaluate interactions. Attackers can pivot into the local CDP origin and create or read disallowed file:// pages despite normal navigation policy restrictions, allowing unauthorized access to sensitive files on the host system.
Affected Systems
The vulnerability affects OpenClaw versions earlier than 2026.4.9. The affected product is the OpenClaw application bundled with Node.js, version specification not detailed beyond the noted cutoff.
Risk and Exploitability
The CVSS score of 7.1 indicates a high severity with potential confidentiality impact. EPSS is not available, and the vulnerability is not listed in CISA KEV. The likely attack vector is through a browser interaction that forces the application to load file:// URLs, so it requires a user to open a crafted link or malicious page; remote exploitation over the network is unlikely without this user interaction.
OpenCVE Enrichment