CVE-2026-22171
OpenClaw versions prior to 2026.2.19 contain a path traversal vulnerability in the Feishu media download flow where untrusted media keys are interpolated directly into temporary file paths in extensions/feishu/src/media.ts. An attacker who can control Feishu media key values returned to the client can use traversal segments to escape os.tmpdir() and write arbitrary files within the OpenClaw process permissions.
Vendor
Product
CWE
Yayın Tarihi
2026-03-18 02:16:21
Güncelleme
2026-03-19 14:52:49
Source Identifier
disclosure@vulncheck.com
KEV Date Added
-
Kategoriler
Referanslar
https://github.com/openclaw/openclaw/commit/c821099157a9767d4df208c6b12f214946507871
https://github.com/openclaw/openclaw/commit/cdb00fe2428000e7a08f9b7848784a0049176705
https://github.com/openclaw/openclaw/commit/ec232a9e2dff60f0e3d7e827a7c868db5254473f
https://github.com/openclaw/openclaw/security/advisories/GHSA-vj3g-5px3-gr46
https://www.vulncheck.com/advisories/openclaw-path-traversal-in-feishu-media-temporary-file-naming