OpenClaw through 2026.3.23 (fixed in commit 4797bbc) contains a path traversal vulnerability in media parsing that allows attackers to read arbitrary files by bypassing path validation in the isLikelyLocalPath() and isValidMedia() functions. Attackers can exploit incomplete validation and the allowBareFilename bypass to reference files outside the intended application sandbox, resulting in disclosure of sensitive information including system files, environment files, and SSH keys.
OpenClaw Media Parsing Path Traversal to Arbitrary File Read
Problem type
Affected products
OpenClaw
< 4797bbc5b96e2cca5532e43b58915c051746fe37 - AFFECTED
References
https://github.com/openclaw/openclaw/security/advisories/GHSA-f6pf-4gjx-c94r
https://github.com/openclaw/openclaw/pull/54642
https://github.com/openclaw/openclaw/commit/4797bbc5b96e2cca5532e43b58915c051746fe37
https://www.vulncheck.com/advisories/openclaw-media-parsing-path-traversal-to-arbitrary-file-read
GitHub Security Advisories
GHSA-hggm-x7r9-mm7v
OpenClaw through 2026.3.23 (fixed in commit 4797bbc) contains a path traversal vulnerability in...
https://github.com/advisories/GHSA-hggm-x7r9-mm7vOpenClaw through 2026.3.23 (fixed in commit 4797bbc) contains a path traversal vulnerability in media parsing that allows attackers to read arbitrary files by bypassing path validation in the isLikelyLocalPath() and isValidMedia() functions. Attackers can exploit incomplete validation and the allowBareFilename bypass to reference files outside the intended application sandbox, resulting in disclosure of sensitive information including system files, environment files, and SSH keys.
https://github.com/openclaw/openclaw/security/advisories/GHSA-f6pf-4gjx-c94r
https://nvd.nist.gov/vuln/detail/CVE-2026-32846
https://github.com/openclaw/openclaw/pull/54642
https://github.com/openclaw/openclaw/commit/4797bbc5b96e2cca5532e43b58915c051746fe37
https://www.vulncheck.com/advisories/openclaw-media-parsing-path-traversal-to-arbitrary-file-read
https://github.com/advisories/GHSA-hggm-x7r9-mm7v
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-32846Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-32846",
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"dateUpdated": "2026-03-26T16:36:00.657Z",
"dateReserved": "2026-03-16T18:11:41.758Z",
"datePublished": "2026-03-26T16:36:00.657Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck",
"dateUpdated": "2026-03-26T16:36:00.657Z"
},
"title": "OpenClaw Media Parsing Path Traversal to Arbitrary File Read",
"descriptions": [
{
"lang": "en",
"value": "OpenClaw through 2026.3.23 (fixed in commit 4797bbc) contains a path traversal vulnerability in media parsing that allows attackers to read arbitrary files by bypassing path validation in the isLikelyLocalPath() and isValidMedia() functions. Attackers can exploit incomplete validation and the allowBareFilename bypass to reference files outside the intended application sandbox, resulting in disclosure of sensitive information including system files, environment files, and SSH keys.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "OpenClaw through 2026.3.23 (fixed in commit 4797bbc) contains a path traversal vulnerability in media parsing that allows attackers to read arbitrary files by bypassing path validation in the isLikelyLocalPath() and isValidMedia() functions. Attackers can exploit incomplete validation and the allowBareFilename bypass to reference files outside the intended application sandbox, resulting in disclosure of sensitive information including system files, environment files, and SSH keys.<br>"
}
]
}
],
"affected": [
{
"vendor": "OpenClaw",
"product": "OpenClaw",
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "git",
"lessThan": "4797bbc5b96e2cca5532e43b58915c051746fe37"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
"cweId": "CWE-22",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-f6pf-4gjx-c94r",
"tags": [
"vendor-advisory"
]
},
{
"url": "https://github.com/openclaw/openclaw/pull/54642",
"tags": [
"issue-tracking"
]
},
{
"url": "https://github.com/openclaw/openclaw/commit/4797bbc5b96e2cca5532e43b58915c051746fe37",
"tags": [
"patch"
]
},
{
"url": "https://www.vulncheck.com/advisories/openclaw-media-parsing-path-traversal-to-arbitrary-file-read",
"tags": [
"third-party-advisory"
]
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Zhijie Zhang",
"type": "finder"
},
{
"lang": "en",
"value": "VulnCheck",
"type": "coordinator"
}
]
}
}
}