Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.5
OpenClaw Canvas Path Traversal Allows Remote Disclosure of Sensitive Data
CVE-2026-3689
Summary
An attacker can access sensitive information on your OpenClaw installation, even if they're not logged in, by manipulating the path to files used by OpenClaw. This is a serious issue because it could expose confidential data to unauthorized parties. To protect your OpenClaw installation, update to the latest version as soon as possible.
Original title
OpenClaw Canvas Path Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of OpenClaw. Authenticati...
Original description
OpenClaw Canvas Path Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of OpenClaw. Authentication is required to exploit this vulnerability.
The specific flaw exists within the handling of the path parameters provided to the canvas gateway endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the service account. Was ZDI-CAN-29312.
The specific flaw exists within the handling of the path parameters provided to the canvas gateway endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the service account. Was ZDI-CAN-29312.
nvd CVSS3.0
6.5
Vulnerability type
CWE-22
Path Traversal
Published: 11 Apr 2026 · Updated: 11 Apr 2026 · First seen: 11 Apr 2026