Impact
OpenClaw before 2026.4.15 allows an attacker to read arbitrary local files through a flaw in the webchat audio embedding helper that does not enforce media root containment. By supplying crafted ReplyPayload.mediaUrl values, the attacker can cause the system to resolve absolute local paths or file URLs, read audio‑like files from the host and embed them base64‑encoded into webchat responses. This vulnerability can expose sensitive data stored on the host, potentially exposing credentials or configuration information. The weakness is a classic Path Traversal or Local File Read flaw, reflected in CWE‑22.
Affected Systems
All OpenClaw installations running a version earlier than 2026.4.15 are impacted, regardless of deployment platform or configuration.
Risk and Exploitability
The CVSS score of 6.3 classifies the issue as moderate severity. No EPSS data is available and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector requires an attacker who can influence the webchat or automated tools that generate ReplyPayload.mediaUrl parameters. Once the parameter is accepted, the attacker can read local files through the compromised helper code. The risk is significant if the application runs with elevated privileges or has access to sensitive files, but does not provide remote code execution.
OpenCVE Enrichment