Untriaged
Permalink
CVE-2026-32982
7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): NONE
Activity log
- Created suggestion
OpenClaw < 2026.3.13 - Telegram Bot Token Exposure in Media Fetch Error Logs
OpenClaw before 2026.3.13 contains an information disclosure vulnerability in the fetchRemoteMedia function that exposes Telegram bot tokens in error messages. When media downloads fail, the original Telegram file URLs containing bot tokens are embedded in MediaFetchError strings and leaked to logs and error surfaces.
References
-
GitHub Security Advisory (GHSA-xwcj-hwhf-h378) third-party-advisory
-
Patch Commit patch
Affected products
OpenClaw
- <2026.3.13
- ==2026.3.13
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>