Description
OpenClaw before 2026.3.31 contains a path traversal vulnerability in ACP dispatch that allows attackers to read arbitrary files by manipulating inbound channel attachment paths. Remote attackers can bypass attachment-cache and root directory checks to access files outside intended directories.
Problem types
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Any version before 2026.3.31
2026.3.31 (semver)
Credits
Christopher Lusk (@north-echo)
References
github.com/...enclaw/security/advisories/GHSA-58q2-7r52-jq62 (GitHub Security Advisory (GHSA-58q2-7r52-jq62))
github.com/...ommit/566fb73d9da2d73c0be0d9b8e5b762e4dcd8e81d (Patch Commit)
www.vulncheck.com/...channel-attachment-path-in-acp-dispatch (VulnCheck Advisory: OpenClaw < 2026.3.31 - Path Traversal via Inbound Channel Attachment Path in ACP Dispatch)