CVE-2026-32026

OpenClaw versions prior to 2026.2.24 contain an improper path validation vulnerability in sandbox media handling that allows absolute paths under the host temporary directory outside the active sandbox root. Attackers can exploit this by providing malicious media references to read and exfiltrate arbitrary files from the host temporary directory through attachment delivery mechanisms.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

23 Mar 2026, 17:13

Type Values Removed Values Added
First Time Openclaw openclaw
Openclaw
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
References () https://github.com/openclaw/openclaw/commit/79a7b3d22ef92e36a4031093d80a0acb0d82f351 - () https://github.com/openclaw/openclaw/commit/79a7b3d22ef92e36a4031093d80a0acb0d82f351 - Patch
References () https://github.com/openclaw/openclaw/commit/d3da67c7a9b463edc1a9b1c1f7af107a34ca32f5 - () https://github.com/openclaw/openclaw/commit/d3da67c7a9b463edc1a9b1c1f7af107a34ca32f5 - Patch
References () https://github.com/openclaw/openclaw/commit/def993dbd843ff28f2b3bad5cc24603874ba9f1e - () https://github.com/openclaw/openclaw/commit/def993dbd843ff28f2b3bad5cc24603874ba9f1e - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-33hm-cq8r-wc49 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-33hm-cq8r-wc49 - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-arbitrary-file-read-via-improper-temporary-path-validation-in-sandbox - () https://www.vulncheck.com/advisories/openclaw-arbitrary-file-read-via-improper-temporary-path-validation-in-sandbox - Third Party Advisory
Summary
  • (es) Versiones de OpenClaw anteriores a 2026.2.24 contienen una vulnerabilidad de validación de ruta incorrecta en el manejo de medios de la sandbox que permite rutas absolutas bajo el directorio temporal del host fuera de la raíz de la sandbox activa. Los atacantes pueden explotar esto al proporcionar referencias de medios maliciosas para leer y exfiltrar archivos arbitrarios del directorio temporal del host a través de mecanismos de entrega de archivos adjuntos.

19 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 22:16

Updated : 2026-03-23 17:13


NVD link : CVE-2026-32026

Mitre link : CVE-2026-32026

CVE.ORG link : CVE-2026-32026


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')