← Back to CVEs
CVE-2026-32024
MEDIUM5.5
Description
OpenClaw versions prior to 2026.2.22 contain a symlink traversal vulnerability in avatar handling that allows attackers to read arbitrary files outside the configured workspace boundary. Remote attackers can exploit this by requesting avatar resources through gateway surfaces to disclose local files accessible to the OpenClaw process.
CVE Details
CVSS v3.1 Score5.5
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published3/19/2026
Last Modified3/23/2026
Sourcenvd
Honeypot Sightings0
Affected Products
openclaw:openclaw
Weaknesses (CWE)
CWE-59CWE-59
References
https://github.com/openclaw/openclaw/commit/3d0337504349954237d09e4d957df5cb844d5e77(disclosure@vulncheck.com)
https://github.com/openclaw/openclaw/commit/6970c2c2db3ee069ef0fff0ade5cfbdd0134f9d2(disclosure@vulncheck.com)
https://github.com/openclaw/openclaw/security/advisories/GHSA-rx3g-mvc3-qfjf(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/openclaw-symlink-traversal-in-avatar-handling(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.