CVE-2026-26321: OpenClaw: path traversal enables local file exfiltration
HIGHCVE-2026-26321 is a path traversal flaw (CWE-22) in OpenClaw's Feishu extension where the `sendMediaFeishu` tool accepts attacker-controlled `mediaUrl` values as raw filesystem paths, enabling reads of arbitrary local files such as SSH keys, `.env` secrets, or `/etc/passwd` with zero authentication. The CVSS 7.5 score (AV:N/AC:L/PR:N/UI:N/C:H) reflects a frictionless exploitation profile — any actor able to influence OpenClaw's tool calls, whether directly or via prompt injection against ingested external content, can silently exfiltrate sensitive files. While there is no CISA KEV entry or public exploit yet, OpenClaw carries 11 total CVEs and AIID #1368 documents active abuse of its extension ecosystem for credential theft, indicating this package and its plugin surface are under active adversarial attention. Patch to OpenClaw 2026.2.14 immediately; if patching is not feasible, disable the Feishu extension and sandbox the assistant process with filesystem restrictions.
Risk Assessment
High risk for any deployment running OpenClaw prior to 2026.2.14 with the Feishu extension enabled. The network-accessible, zero-privilege, no-user-interaction CVSS profile means the attack requires no special position beyond the ability to feed crafted input into the agent's context. Personal AI assistants typically run with broad local filesystem access, giving a successful exploit direct reach to credentials, config files, and secrets. The 11-CVE track record and documented real-world abuse of OpenClaw's extension ecosystem (AIID #1368) elevates practical risk beyond what CVSS alone conveys.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| openclaw | pip | — | No patch |
Do you use openclaw? You're affected.
Severity & Risk
Recommended Action
- Patch immediately: upgrade to OpenClaw 2026.2.14 (fix commit 5b4121d6, GHSA-8jpq-5h99-ff5r).
- If patching is not immediately possible, disable the Feishu extension in OpenClaw settings.
- Sandbox the OpenClaw process using OS-level controls (chroot, container, or macOS sandbox profiles) to restrict filesystem access to necessary directories only.
- Audit Feishu outbound API call logs for unexpected payloads containing file content.
- Review all AI agent tool definitions for parameters that accept file paths and enforce allow-list validation.
- Monitor for prompt injection patterns in content ingested by the assistant (emails, documents, web pages).
Classification
Compliance Impact
This CVE is relevant to:
Related AI Incidents (1)
Source: AI Incident Database (AIID)
Technical Details
NVD Description
OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Feishu extension previously allowed `sendMediaFeishu` to treat attacker-controlled `mediaUrl` values as local filesystem paths and read them directly. If an attacker can influence tool calls (directly or via prompt injection), they may be able to exfiltrate local files by supplying paths such as `/etc/passwd` as `mediaUrl`. Upgrade to OpenClaw `2026.2.14` or newer to receive a fix. The fix removes direct local file reads from this path and routes media loading through hardened helpers that enforce local-root restrictions.
Exploitation Scenario
An attacker embeds a prompt injection in a document or email that OpenClaw is asked to process: the injected instruction directs the assistant to call `sendMediaFeishu` with `mediaUrl` set to `/home/user/.ssh/id_rsa`. The vulnerable extension reads the private key from disk and transmits it as a media payload to the attacker's Feishu contact, with no authentication, no user confirmation prompt, and no error raised. In a more automated variant, the attacker publishes a malicious webpage or Feishu message containing the injection, which triggers silently when OpenClaw browses or processes it as part of an agentic task, exfiltrating credentials to a controlled endpoint before the user is aware.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N References
Timeline
Related Vulnerabilities
CVE-2026-30741 9.8 OpenClaw: RCE via request-side prompt injection
Same package: openclaw CVE-2026-28451 9.3 OpenClaw: SSRF via Feishu extension exposes internal services
Same package: openclaw GHSA-m3mh-3mpg-37hw 8.6 OpenClaw: .npmrc hijack enables RCE on plugin install
Same package: openclaw CVE-2026-27001 7.8 OpenClaw: prompt injection via unsanitized workspace path
Same package: openclaw GHSA-hr5v-j9h9-xjhg 7.7 OpenClaw: sandbox escape via mediaUrl path traversal
Same package: openclaw
AI Threat Alert