Vulnerability Description
OpenClaw versions prior to 2026.2.24 contain an improper path validation vulnerability in sandbox media handling that allows absolute paths under the host temporary directory outside the active sandbox root. Attackers can exploit this by providing malicious media references to read and exfiltrate arbitrary files from the host temporary directory through attachment delivery mechanisms.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | < 2026.2.24 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/commit/79a7b3d22ef92e36a4031093d80a0acb0d82Patch
- https://github.com/openclaw/openclaw/commit/d3da67c7a9b463edc1a9b1c1f7af107a34caPatch
- https://github.com/openclaw/openclaw/commit/def993dbd843ff28f2b3bad5cc24603874baPatch
- https://github.com/openclaw/openclaw/security/advisories/GHSA-33hm-cq8r-wc49Vendor Advisory
- https://www.vulncheck.com/advisories/openclaw-arbitrary-file-read-via-improper-tThird Party Advisory
FAQ
What is CVE-2026-32026?
CVE-2026-32026 is a vulnerability with a CVSS score of 6.5 (MEDIUM). OpenClaw versions prior to 2026.2.24 contain an improper path validation vulnerability in sandbox media handling that allows absolute paths under the host temporary directory outside the active sandbo...
How severe is CVE-2026-32026?
CVE-2026-32026 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32026?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.