Arbitrary Local File Read Vulnerability in OpenClaw Webchat by OpenClaw
CVE-2026-44996

6.3MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
11 May 2026

What is CVE-2026-44996?

OpenClaw versions prior to 2026.4.15 are susceptible to an arbitrary local file read vulnerability within the webchat audio embedding feature. The vulnerability arises due to inadequate application of local media root containment checks, allowing attackers to manipulate the ReplyPayload.mediaUrl parameters generated by agents or tools. This manipulation can lead to the resolution of absolute local paths or file URLs, enabling the reading of audio-like files. Consequently, these files can be base64-encoded and embedded into webchat responses, potentially exposing sensitive data to unauthorized users.

Affected Version(s)

OpenClaw 0 < 2026.4.15

OpenClaw 2026.4.15

References

CVSS V4

Score:
6.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

zsx (@zsxsoft)
KeenSecurityLab
.