Path Traversal Vulnerability in OpenClaw by OpenClaw
CVE-2026-41363

6MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
27 April 2026

What is CVE-2026-41363?

OpenClaw versions 2026.2.6 to 2026.3.24 have a path traversal vulnerability in the Feishu extension’s resolveUploadInput function that allows attackers to bypass file-system sandbox restrictions. This vulnerability facilitates improper path resolution during image upload operations, enabling unauthorized access to read files outside the designated localRoots boundaries. It is essential for organizations utilizing OpenClaw to implement strict upload validation to mitigate the risk associated with this vulnerability.

Affected Version(s)

OpenClaw 2026.2.6

References

CVSS V4

Score:
6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

ADumpling
.