CVE-2026-33581 PUBLISHED

OpenClaw < 2026.3.24 - Arbitrary File Read via mediaUrl and fileUrl Parameters

Assigner: VulnCheck
Reserved: 23.03.2026 Published: 31.03.2026 Updated: 31.03.2026

OpenClaw before 2026.3.24 contains a sandbox bypass vulnerability in the message tool that allows attackers to read arbitrary local files by using mediaUrl and fileUrl alias parameters that bypass localRoots validation. Remote attackers can exploit this by routing file requests through unvalidated alias parameters to access files outside the intended sandbox directory.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 7.1

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.3.24 (excl.)
  • Version 2026.3.24 is unaffected

Credits

  • AntAISecurityLab reporter

References

Problem Types

  • Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE