Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.1
OpenClaw: Attackers Can Access Local Files Through Message Actions
GHSA-fqcm-97m6-w7rm
CVE-2026-27522
Summary
The OpenClaw software does not properly check the source of files attached to messages, which could allow an attacker to access sensitive local files. This is a concern for businesses using OpenClaw's messaging feature. To fix this issue, upgrade to the latest version of OpenClaw (2026.2.24 or later) as soon as it's available.
What to do
- Update steipete openclaw to version 2026.2.24.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| steipete | openclaw | <= 2026.2.24 | 2026.2.24 |
Original title
OpenClaw versions prior to 2026.2.24 contain a local media root bypass vulnerability in sendAttachment and setGroupIcon message actions when sandboxRoot is unset. Attackers can hydrate media from l...
Original description
OpenClaw versions prior to 2026.2.24 contain a local media root bypass vulnerability in sendAttachment and setGroupIcon message actions when sandboxRoot is unset. Attackers can hydrate media from local absolute paths to read arbitrary host files accessible by the runtime user.
osv CVSS4.0
8.3
Vulnerability type
CWE-200
Information Exposure
CWE-22
Path Traversal
Published: 18 Mar 2026 · Updated: 18 Mar 2026 · First seen: 18 Mar 2026