LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-22171

CVE-2026-22171 - Vulnerability Analysis

HighCVSS: 8.2

Last Updated: March 19, 2026

OpenClaw - Path Traversal

Published: March 18, 2026Updated: March 19, 2026Remote Exploitable

Overview

OpenClaw < 2026.2.19 contains a path traversal vulnerability caused by untrusted media keys interpolated into temporary file paths in extensions/feishu/src/media.ts, letting attackers write arbitrary files within process permissions, exploit requires control of Feishu media key values.

Severity & Score

Severity: High
CVSS Score: 8.2
EPSS Score: 4.1%(Probability of exploitation in next 30 days)

Impact

Attackers can write arbitrary files within OpenClaw process permissions, potentially leading to system compromise or data tampering.

Mitigation

Update to version 2026.2.19 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 18, 2026

🟠 CVE-2026-22171 - High (8.2) OpenClaw versions prior to 2026.2.19 contain a path traversal vulnerability in the Feishu media download flow where untrusted media keys are interpolated directly into temporary file paths in extensions/feishu/src/media.ts. An attacker who can con... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-22171/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-22171
Severity
High
CVSS Score
8.2
Type
path_traversal
Status
confirmed
EPSS
4.1%
Social Posts
1

CWE

  • CWE-22

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

EPSS Score

4.1%Probability of exploitation in the next 30 days