Vulnerability Description
OpenClaw versions 2026.4.7 before 2026.4.15 fail to enforce local-root containment on tool-result media paths, allowing arbitrary local and UNC file access. Attackers can craft malicious tool-result media references to trigger host-side file reads or Windows network path access, potentially disclosing sensitive files or exposing credentials.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | >= 2026.4.7, < 2026.4.15 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/commit/1470de5d3e0970856d86cd99336bb8ada3fePatch
- https://github.com/openclaw/openclaw/commit/52ef42302ead9e183e6c8810e0a04ee4ef8aPatch
- https://github.com/openclaw/openclaw/commit/6e58f1f9f54bca1fea1268ec0ee4c01a2af0Patch
- https://github.com/openclaw/openclaw/security/advisories/GHSA-mr34-9552-qr95PatchVendor Advisory
- https://www.vulncheck.com/advisories/openclaw-arbitrary-file-read-via-unvalidateThird Party Advisory
FAQ
What is CVE-2026-41389?
CVE-2026-41389 is a vulnerability with a CVSS score of 5.8 (MEDIUM). OpenClaw versions 2026.4.7 before 2026.4.15 fail to enforce local-root containment on tool-result media paths, allowing arbitrary local and UNC file access. Attackers can craft malicious tool-result m...
How severe is CVE-2026-41389?
CVE-2026-41389 has been rated MEDIUM with a CVSS base score of 5.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41389?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.