PocketClawvol. 1 · 2026
high · CVSS 7.8patched

CVE-2026-24891

OpenClaw — path traversal in file tool

Summary

The default file-read tool in OpenClaw 2026.3.x did not normalise relative paths. An agent given a maliciously-crafted path (via prompt injection or otherwise) could read files outside its declared workspace, including SSH keys and credential vaults.

Details

CVE IDCVE-2026-24891
Severityhigh (7.8)
CVSS vectorAV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Published2026-03-17
Patched2026-03-19
Affected versions2026.3.0 – 2026.3.11
Fixed in2026.3.12
Exploited in the wildno known exploitation

Affected projects

OpenClaw

What to do

  • If you run an affected version: upgrade to 2026.3.12 immediately. Do not delay this for convenience reasons.
  • Rotate any credentials that may have been exposed via the affected component.
  • Audit your logs for indicators of exploitation — unexpected outbound traffic, anomalous tool calls, unfamiliar authenticated sessions.
  • If exploitation is confirmed, treat the host as compromised: rebuild from a clean image, rotate every secret on the host, audit lateral movement.

Sources


See also: all CVEs, tracked agents, methodology.