CVE-2026-44111

MEDIUM

OpenClaw < 2026.4.15 - Arbitrary Markdown File Read via QMD memory_get

Title source: cna
STIX 2.1

Description

OpenClaw before 2026.4.15 contains an arbitrary file read vulnerability in the QMD backend memory_get function that allows callers to read any Markdown files within the workspace root. Attackers with access to the memory tool can bypass path restrictions by providing arbitrary workspace Markdown paths to read files outside canonical memory locations or indexed QMD result sets.

References (3)

Core 3
Core References
Vendor Advisory vendor-advisory
GitHub Security Advisory (GHSA-f934-5rqf-xx47)
https://github.com/openclaw/openclaw/security/advisories/GHSA-f934-5rqf-xx47
Third Party Advisory third-party-advisory
VulnCheck Advisory: OpenClaw < 2026.4.15 - Arbitrary Markdown File Read via QMD memory_get
https://www.vulncheck.com/advisories/openclaw-arbitrary-markdown-file-read-via-qmd-memory-get

Scores

CVSS v3 4.3
EPSS 0.0003
EPSS Percentile 10.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-183
Status published
Products (3)
OpenClaw/OpenClaw < 2026.4.15
openclaw/openclaw < 2026.4.15
OpenClaw/OpenClaw 2026.4.15
Published May 06, 2026
Tracked Since May 07, 2026