OpenClaw before 2026.3.13 contains an information disclosure vulnerability in the fetchRemoteMedia function that exposes Telegram bot tokens in error messages. When media downloads fail, the original Telegram file URLs containing bot tokens are embedded in MediaFetchError strings and leaked to logs and error surfaces.
References
Configurations
History
02 Apr 2026, 13:12
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Openclaw openclaw
Openclaw |
|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/openclaw/openclaw/commit/7a53eb7ea8295b08be137e231c9a98c1a79b5cd5 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-xwcj-hwhf-h378 - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-telegram-bot-token-exposure-in-media-fetch-error-logs - Third Party Advisory |
31 Mar 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-31 12:16
Updated : 2026-04-02 13:12
NVD link : CVE-2026-32982
Mitre link : CVE-2026-32982
CVE.ORG link : CVE-2026-32982
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-532
Insertion of Sensitive Information into Log File
