CVE-2026-22171 - Vulnerability Analysis
HighCVSS: 8.2Last Updated: March 18, 2026
OpenClaw - Path Traversal
Published: March 18, 2026Updated: March 18, 2026Remote Exploitable
Overview
OpenClaw < 2026.2.19 contains a path traversal vulnerability caused by untrusted media keys interpolated into temporary file paths in extensions/feishu/src/media.ts, letting attackers write arbitrary files within process permissions, exploit requires control of Feishu media key values.
Severity & Score
Severity: High
CVSS Score: 8.2
Impact
Attackers can write arbitrary files within OpenClaw process permissions, potentially leading to system compromise or data tampering.
Mitigation
Update to version 2026.2.19 or later.
References
- https://github.com/openclaw/openclaw/security/advisories/GHSA-vj3g-5px3-gr46
- https://www.vulncheck.com/advisories/openclaw-path-traversal-in-feishu-media-temporary-file-naming
- https://github.com/openclaw/openclaw/commit/c821099157a9767d4df208c6b12f214946507871
- https://github.com/openclaw/openclaw/commit/cdb00fe2428000e7a08f9b7848784a0049176705
- https://github.com/openclaw/openclaw/commit/ec232a9e2dff60f0e3d7e827a7c868db5254473f
Related Resources
Details
- CVE ID
- CVE-2026-22171
- Severity
- High
- CVSS Score
- 8.2
- Type
- path_traversal
- Status
- new
CWE
- CWE-22
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N