CVE-2026-22171

OpenClaw versions prior to 2026.2.19 contain a path traversal vulnerability in the Feishu media download flow where untrusted media keys are interpolated directly into temporary file paths in extensions/feishu/src/media.ts. An attacker who can control Feishu media key values returned to the client can use traversal segments to escape os.tmpdir() and write arbitrary files within the OpenClaw process permissions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

19 Mar 2026, 14:52

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/commit/c821099157a9767d4df208c6b12f214946507871 - () https://github.com/openclaw/openclaw/commit/c821099157a9767d4df208c6b12f214946507871 - Patch
References () https://github.com/openclaw/openclaw/commit/cdb00fe2428000e7a08f9b7848784a0049176705 - () https://github.com/openclaw/openclaw/commit/cdb00fe2428000e7a08f9b7848784a0049176705 - Patch
References () https://github.com/openclaw/openclaw/commit/ec232a9e2dff60f0e3d7e827a7c868db5254473f - () https://github.com/openclaw/openclaw/commit/ec232a9e2dff60f0e3d7e827a7c868db5254473f - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-vj3g-5px3-gr46 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-vj3g-5px3-gr46 - Mitigation, Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-path-traversal-in-feishu-media-temporary-file-naming - () https://www.vulncheck.com/advisories/openclaw-path-traversal-in-feishu-media-temporary-file-naming - Third Party Advisory
First Time Openclaw openclaw
Openclaw
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

18 Mar 2026, 14:52

Type Values Removed Values Added
Summary
  • (es) Las versiones de OpenClaw anteriores a 2026.2.19 contienen una vulnerabilidad de salto de ruta en el flujo de descarga de medios de Feishu donde las claves de medios no confiables se interpolan directamente en las rutas de archivos temporales en extensions/feishu/src/media.ts. Un atacante que puede controlar los valores de las claves de medios de Feishu devueltos al cliente puede usar segmentos de salto para escapar de os.tmpdir() y escribir archivos arbitrarios dentro de los permisos del proceso de OpenClaw.

18 Mar 2026, 02:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-18 02:16

Updated : 2026-03-19 14:52


NVD link : CVE-2026-22171

Mitre link : CVE-2026-22171

CVE.ORG link : CVE-2026-22171


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')