CVE-2026-44996 PUBLISHED

OpenClaw < 2026.4.15 - Arbitrary Local File Read via Webchat Audio Embedding

Assigner: VulnCheck
Reserved: 08.05.2026 Published: 11.05.2026 Updated: 11.05.2026

OpenClaw before 2026.4.15 contains an arbitrary local file read vulnerability in the webchat audio embedding helper that fails to apply local media root containment checks. Attackers can influence agent or tool-produced ReplyPayload.mediaUrl parameters to resolve absolute local paths or file URLs, read audio-like files, and embed them base64-encoded into webchat responses.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 6.3

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.4.15 (excl.)
  • Version 2026.4.15 is unaffected

Credits

  • zsx (@zsxsoft) reporter
  • KeenSecurityLab coordinator

References

Problem Types

  • Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE