Summary
The default file-read tool in OpenClaw 2026.3.x did not normalise relative paths. An agent given a maliciously-crafted path (via prompt injection or otherwise) could read files outside its declared workspace, including SSH keys and credential vaults.
Details
| CVE ID | CVE-2026-24891 |
| Severity | high (7.8) |
| CVSS vector | AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
| Published | 2026-03-17 |
| Patched | 2026-03-19 |
| Affected versions | 2026.3.0 – 2026.3.11 |
| Fixed in | 2026.3.12 |
| Exploited in the wild | no known exploitation |
Affected projects
What to do
- If you run an affected version: upgrade to
2026.3.12immediately. Do not delay this for convenience reasons. - Rotate any credentials that may have been exposed via the affected component.
- Audit your logs for indicators of exploitation — unexpected outbound traffic, anomalous tool calls, unfamiliar authenticated sessions.
- If exploitation is confirmed, treat the host as compromised: rebuild from a clean image, rotate every secret on the host, audit lateral movement.
Sources
- NIST NVD: CVE-2026-24891 on NVD
See also: all CVEs, tracked agents, methodology.