Untriaged
Permalink
CVE-2026-41389
5.8 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): NONE
- Availability impact (A): NONE
Activity log
- Created suggestion
OpenClaw 2026.4.7 < 2026.4.15 - Arbitrary File Read via Unvalidated Tool-Result Media Paths
OpenClaw versions 2026.4.7 before 2026.4.15 fail to enforce local-root containment on tool-result media paths, allowing arbitrary local and UNC file access. Attackers can craft malicious tool-result media references to trigger host-side file reads or Windows network path access, potentially disclosing sensitive files or exposing credentials.
References
-
GitHub Security Advisory (GHSA-mr34-9552-qr95) vendor-advisory
-
Patch Commit patch
-
Patch Commit patch
-
Patch Commit patch
-
https://www.vulncheck.com/advisories/openclaw-arbitrary-file-read-via-unvalidat… third-party-advisory
Affected products
OpenClaw
- <2026.4.15
- ==2026.4.15
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>
-
@mkg20001 Maciej Krüger <mkg20001+nix@gmail.com>