Home

Description

OpenClaw versions prior to 2026.2.24 contain a local media root bypass vulnerability in sendAttachment and setGroupIcon message actions when sandboxRoot is unset. Attackers can hydrate media from local absolute paths to read arbitrary host files accessible by the runtime user.

PUBLISHED Reserved 2026-02-19 | Published 2026-03-18 | Updated 2026-03-18 | Assigner VulnCheck




HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

Any version before 2026.2.24
affected

Credits

Baozongwi'xd (@GCXWLP) reporter

References

github.com/...enclaw/security/advisories/GHSA-fqcm-97m6-w7rm (GitHub Security Advisory (GHSA-fqcm-97m6-w7rm)) third-party-advisory

github.com/...ommit/270ab03e379f9653e15f7033c9830399b66b7e51 (Patch Commit) patch

www.vulncheck.com/...chment-and-setgroupicon-message-actions (VulnCheck Advisory: OpenClaw < 2026.2.24 - Arbitrary File Read via sendAttachment and setGroupIcon Message Actions) third-party-advisory

cve.org (CVE-2026-27522)

nvd.nist.gov (CVE-2026-27522)

Download JSON