CVE-2026-35668 - Vulnerability Analysis
HighCVSS: 7.7Last Updated: April 13, 2026
OpenClaw - Path Traversal
Overview
OpenClaw < 2026.3.24 contains a path traversal vulnerability caused by incomplete parameter validation in sandbox enforcement, letting sandboxed agents read arbitrary files from other agents' workspaces, exploit requires sandboxed agent privileges.
Severity & Score
Impact
Sandboxed agents can read sensitive files including API keys and configuration data from other agents' workspaces.
Mitigation
Update to version 2026.3.24 or later.
References
Social Media Activity(2 posts)
š CVE-2026-35668 - High (7.7) OpenClaw before 2026.3.24 contains a path traversal vulnerability in sandbox enforcement allowing sandboxed agents to read arbitrary files from other agents' workspaces via unnormalized mediaUrl or fileUrl parameter keys. Attackers can exploit inc... š https://www.thehackerwire.com/vulnerability/CVE-2026-35668/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-35668 - High (7.7) OpenClaw before 2026.3.24 contains a path traversal vulnerability in sandbox enforcement allowing sandboxed agents to read arbitrary files from other agents' workspaces via unnormalized mediaUrl or fileUrl parameter keys. Attackers can exploit inc... š https://www.thehackerwire.com/vulnerability/CVE-2026-35668/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-35668
- Severity
- High
- CVSS Score
- 7.7
- Type
- path_traversal
- Status
- confirmed
- EPSS
- 5.3%
- Social Posts
- 2
CWE
- CWE-22
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N