CVE-2026-32846
OpenClaw through 2026.3.23 (fixed in commit 4797bbc) contains a path traversal vulnerability in media parsing that allows attackers to read arbitrary files by bypassing path validation in the isLikelyLocalPath() and isValidMedia() functions. Attackers can exploit incomplete validation and the allowBareFilename bypass to reference files outside the intended application sandbox, resulting in disclosure of sensitive information including system files, environment files, and SSH keys.
Vendor
Product
CWE
Yayın Tarihi
2026-03-26 17:16:37
Güncelleme
2026-03-31 21:40:05
Source Identifier
disclosure@vulncheck.com
KEV Date Added
-
Kategoriler
Referanslar
https://github.com/openclaw/openclaw/commit/4797bbc5b96e2cca5532e43b58915c051746fe37
https://github.com/openclaw/openclaw/pull/54642
https://github.com/openclaw/openclaw/security/advisories/GHSA-f6pf-4gjx-c94r
https://www.vulncheck.com/advisories/openclaw-media-parsing-path-traversal-to-arbitrary-file-read
https://github.com/openclaw/openclaw/pull/54642