Vulnerability Description
OpenClaw Canvas Path Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of OpenClaw. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of the path parameters provided to the canvas gateway endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the service account. Was ZDI-CAN-29312.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | < 2026.2.21 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/security/advisories/GHSA-jq4x-98m3-ggq6Third Party AdvisoryExploit
- https://www.zerodayinitiative.com/advisories/ZDI-26-227/Third Party AdvisoryExploit
FAQ
What is CVE-2026-3689?
CVE-2026-3689 is a vulnerability with a CVSS score of 6.5 (MEDIUM). OpenClaw Canvas Path Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of OpenClaw. Authentication ...
How severe is CVE-2026-3689?
CVE-2026-3689 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3689?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.