Path Traversal Vulnerability in OpenClaw by OpenClaw
CVE-2026-41370

7.1HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
27 April 2026

What is CVE-2026-41370?

OpenClaw, before version 2026.3.31, is susceptible to a path traversal vulnerability in its ACP dispatch mechanism. This flaw allows remote attackers to exploit the inbound channel attachment paths, enabling them to read arbitrary files. By circumventing attachment-cache and root directory validations, attackers can gain unauthorized access to files residing outside designated directories. This vulnerability poses significant risks and requires immediate attention to prevent potential data breaches.

Affected Version(s)

OpenClaw 0 < 2026.3.31

OpenClaw 2026.3.31

References

CVSS V4

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Christopher Lusk (@north-echo)
.