CVE-2026-25475: OpenClaw: path traversal enables arbitrary file read
MEDIUM PoC AVAILABLEOpenClaw's media path parser (src/media/parse.ts) fails to reject absolute paths, home-directory references, and directory traversal sequences, allowing any agent context — including one manipulated via a malicious skill or prompt injection — to output MEDIA:/home/user/.ssh/id_rsa or MEDIA:/etc/shadow and silently deliver file contents to the conversation channel. With a public PoC already circulating and 11 prior CVEs in this package, exploitation friction is minimal; the parallel malicious-skills campaign documented in AIID #1368 (17% of audited skills assessed as malicious on ClawHub) provides a ready-made delivery chain that maps directly onto this vulnerability. Patch to version 2026.1.30 immediately, restrict the OpenClaw process to a dedicated low-privilege account, and scan conversation logs for MEDIA: tokens referencing absolute paths outside expected media directories.
Risk Assessment
Contextual risk is elevated beyond the CVSS 6.5 medium score. The CVSS vector (AV:N/AC:L/PR:L/UI:N/C:H) confirms low-complexity network exploitation with high confidentiality impact — an attacker needs only a low-privilege position (e.g., a published skill or an injected prompt in processed content) to reach SSH keys, API tokens, .env files, and OS credential stores. The public PoC lowers the bar to script-kiddie level, and the documented malicious-skills ecosystem (AIID #1368) means a working exploit delivery chain already exists in the wild. Desktop deployments running as the primary user account face the broadest filesystem exposure, as no chroot or sandboxing is applied by default.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| openclaw | pip | — | No patch |
Do you use openclaw? You're affected.
Severity & Risk
Recommended Action
- Patch immediately to OpenClaw 2026.1.30, which sanitizes paths in isValidMedia() to reject absolute paths, ~ expansions, and ../ traversal sequences.
- Until patched, apply OS-level filesystem restrictions: run OpenClaw under a dedicated service account with an AppArmor or SELinux profile confining readable paths to explicitly allowlisted media directories.
- Disable or quarantine third-party skills — given AIID #1368, treat unverified ClawHub skills as active threat vectors and audit all installed skills against a known-good list.
- Search conversation and audit logs for MEDIA: tokens followed by paths referencing /etc/, ~/.ssh/, ~/.aws/, ~/.config/, or any path outside the intended media directory.
- Rotate exposed secrets (API keys, SSH keys, tokens, passwords) if OpenClaw ran unpatched alongside external or community skills.
Classification
Compliance Impact
This CVE is relevant to:
Related AI Incidents (1)
Source: AI Incident Database (AIID)
Technical Details
NVD Description
OpenClaw is a personal AI assistant. Prior to version 2026.1.30, the isValidMedia() function in src/media/parse.ts allows arbitrary file paths including absolute paths, home directory paths, and directory traversal sequences. An agent can read any file on the system by outputting MEDIA:/path/to/file, exfiltrating sensitive data to the user/channel. This issue has been patched in version 2026.1.30.
Exploitation Scenario
An attacker publishes a benign-looking productivity skill on ClawHub. Embedded in the skill's response templates is an indirect prompt injection payload instructing the agent to output MEDIA:/home/victim/.ssh/id_rsa, MEDIA:/home/victim/.env, and MEDIA:/home/victim/.aws/credentials in sequence. When the victim installs and invokes the skill, OpenClaw processes the injected instructions, calls isValidMedia() on each absolute path, and — due to the absence of path sanitization — renders the file contents inline in the conversation. A second capability within the malicious skill (or a listening attacker with channel access) captures the output and forwards it to an attacker-controlled server. The exploit requires no custom tooling: the public PoC demonstrates the path traversal, and the ClawHub distribution channel provides the social-engineering wrapper at no additional cost.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N References
- github.com/openclaw/openclaw/security/advisories/GHSA-r8g4-86fx-92mq Exploit Patch Vendor
Timeline
Related Vulnerabilities
CVE-2026-30741 9.8 OpenClaw: RCE via request-side prompt injection
Same package: openclaw CVE-2026-28451 9.3 OpenClaw: SSRF via Feishu extension exposes internal services
Same package: openclaw GHSA-m3mh-3mpg-37hw 8.6 OpenClaw: .npmrc hijack enables RCE on plugin install
Same package: openclaw CVE-2026-27001 7.8 OpenClaw: prompt injection via unsanitized workspace path
Same package: openclaw GHSA-hr5v-j9h9-xjhg 7.7 OpenClaw: sandbox escape via mediaUrl path traversal
Same package: openclaw
AI Threat Alert