CVE-2026-44996
LOWOpenClaw < 2026.4.15 - Arbitrary Local File Read via Webchat Audio Embedding
Title source: cnaDescription
OpenClaw before 2026.4.15 contains an arbitrary local file read vulnerability in the webchat audio embedding helper that fails to apply local media root containment checks. Attackers can influence agent or tool-produced ReplyPayload.mediaUrl parameters to resolve absolute local paths or file URLs, read audio-like files, and embed them base64-encoded into webchat responses.
References (3)
Core 3
Core References
Vendor Advisory vendor-advisory
GitHub Security Advisory (GHSA-gfg9-5357-hv4c)
https://github.com/openclaw/openclaw/security/advisories/GHSA-gfg9-5357-hv4c
Patch patch
Patch Commit
https://github.com/openclaw/openclaw/commit/6e58f1f9f54bca1fea1268ec0ee4c01a2af03dde
Third Party Advisory third-party-advisory
VulnCheck Advisory: OpenClaw < 2026.4.15 - Arbitrary Local File Read via Webchat Audio Embedding
https://www.vulncheck.com/advisories/openclaw-arbitrary-local-file-read-via-webchat-audio-embedding
Scores
CVSS v3
3.7
EPSS
0.0005
EPSS Percentile
16.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (3)
OpenClaw/OpenClaw
< 2026.4.15
openclaw/openclaw
< 2026.4.15
OpenClaw/OpenClaw
2026.4.15
Published
May 11, 2026
Tracked Since
May 11, 2026