CVE-2026-44996

LOW

OpenClaw < 2026.4.15 - Arbitrary Local File Read via Webchat Audio Embedding

Title source: cna
STIX 2.1

Description

OpenClaw before 2026.4.15 contains an arbitrary local file read vulnerability in the webchat audio embedding helper that fails to apply local media root containment checks. Attackers can influence agent or tool-produced ReplyPayload.mediaUrl parameters to resolve absolute local paths or file URLs, read audio-like files, and embed them base64-encoded into webchat responses.

References (3)

Core 3
Core References
Vendor Advisory vendor-advisory
GitHub Security Advisory (GHSA-gfg9-5357-hv4c)
https://github.com/openclaw/openclaw/security/advisories/GHSA-gfg9-5357-hv4c
Third Party Advisory third-party-advisory
VulnCheck Advisory: OpenClaw < 2026.4.15 - Arbitrary Local File Read via Webchat Audio Embedding
https://www.vulncheck.com/advisories/openclaw-arbitrary-local-file-read-via-webchat-audio-embedding

Scores

CVSS v3 3.7
EPSS 0.0005
EPSS Percentile 16.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-22
Status published
Products (3)
OpenClaw/OpenClaw < 2026.4.15
openclaw/openclaw < 2026.4.15
OpenClaw/OpenClaw 2026.4.15
Published May 11, 2026
Tracked Since May 11, 2026