Impact
The vulnerability resides in the QMD backend memory_get function of OpenClaw versions prior to 2026.4.15. It permits reading any Markdown files located under the workspace root. This allows an attacker to recover potentially sensitive source code or configuration data that the application may contain. The weakness is classified as CWE-183, which reflects path traversal or relative path handling issues.
Affected Systems
OpenClaw OpenClaw is affected. All releases earlier than 2026.4.15 are vulnerable. This includes every prior minor or patch release of the 2026.4 series.
Risk and Exploitability
The CVSS score of 2.3 indicates low severity, and there is no EPSS or KEV listing for this flaw. Exploitation requires access to the memory tool, meaning the attacker must already have some level of privilege or ability to invoke privileged components. The attack vector can be inferred as a local or privileged remote execution that targets the memory_get API, bypassing path restrictions by specifying arbitrary Markdown paths. While the risk of publicly available exploits is currently low, the ability to read arbitrary files can assist in further attacks such as credential theft or privilege escalation if the read data is valuable.
OpenCVE Enrichment