OpenClaw versions prior to 2026.2.24 contain a local media root bypass vulnerability in sendAttachment and setGroupIcon message actions when sandboxRoot is unset. Attackers can hydrate media from local absolute paths to read arbitrary host files accessible by the runtime user.
References
Configurations
History
18 Mar 2026, 20:05
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Openclaw openclaw
Openclaw |
|
| References | () https://github.com/openclaw/openclaw/commit/270ab03e379f9653e15f7033c9830399b66b7e51 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-fqcm-97m6-w7rm - Patch, Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-arbitrary-file-read-via-sendattachment-and-setgroupicon-message-actions - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
18 Mar 2026, 14:52
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
18 Mar 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-18 02:16
Updated : 2026-03-18 20:05
NVD link : CVE-2026-27522
Mitre link : CVE-2026-27522
CVE.ORG link : CVE-2026-27522
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
