Vulnerability Description
OpenClaw versions 2026.2.6 through 2026.3.24 contain a path traversal vulnerability in the Feishu extension resolveUploadInput function that bypasses file-system sandbox restrictions. Attackers can exploit improper path resolution during upload_image operations to read arbitrary files outside configured localRoots boundaries.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | >= 2026.2.6, < 2026.3.28 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/security/advisories/GHSA-qf48-qfv4-jjm9Vendor Advisory
- https://www.vulncheck.com/advisories/openclaw-arbitrary-file-read-via-feishu-uplThird Party Advisory
FAQ
What is CVE-2026-41363?
CVE-2026-41363 is a vulnerability with a CVSS score of 5.3 (MEDIUM). OpenClaw versions 2026.2.6 through 2026.3.24 contain a path traversal vulnerability in the Feishu extension resolveUploadInput function that bypasses file-system sandbox restrictions. Attackers can ex...
How severe is CVE-2026-41363?
CVE-2026-41363 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41363?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.