CVE-2026-3689
Received Received - Intake
Path Traversal in OpenClaw Canvas Leads to Info Disclosure

Publication date: 2026-04-11

Last updated on: 2026-04-27

Assigner: Zero Day Initiative

Description
OpenClaw Canvas Path Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of OpenClaw. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of the path parameters provided to the canvas gateway endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the service account. Was ZDI-CAN-29312.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-11
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.2.21 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

CVE-2026-3689 is a path traversal information disclosure vulnerability that allows authenticated attackers to read arbitrary files on the affected OpenClaw system. This can lead to unauthorized disclosure of sensitive information accessible to the service account running the application.

Such unauthorized disclosure of sensitive data can potentially impact compliance with data protection regulations and standards like GDPR and HIPAA, which require safeguarding personal and sensitive information against unauthorized access and disclosure.

By enabling attackers to exfiltrate sensitive files, this vulnerability increases the risk of data breaches, which may result in regulatory non-compliance, legal liabilities, and reputational damage.

Mitigation through patching and proper input validation is essential to maintain compliance and protect sensitive data.


Can you explain this vulnerability to me?

CVE-2026-3689 is a path traversal information disclosure vulnerability in OpenClaw's Canvas gateway endpoint.

The vulnerability arises because the application does not properly validate user-supplied path parameters before using them in file operations.

An authenticated attacker can exploit this flaw by sending a specially crafted request with a malicious file path, allowing them to read arbitrary files accessible to the service account running OpenClaw.

This means sensitive information stored on the server can be disclosed to the attacker.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of sensitive information stored on the server where OpenClaw is installed.

  • An attacker with valid authentication can read arbitrary files such as system files (/etc/passwd), private keys (~/.ssh/id_rsa), AWS credentials (~/.aws/credentials), or the gateway's own token.
  • The attacker can exfiltrate this information by exploiting the vulnerability, potentially leading to further compromise or data leakage.

The impact is significant because the attacker gains access to sensitive data within the context of the service account running OpenClaw.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to exploit the path traversal flaw on the OpenClaw canvas gateway endpoint with authenticated access.

A practical detection method involves sending an authenticated POST request to the /tools/invoke endpoint with the action parameter set to "a2ui_push" and the jsonlPath parameter pointing to sensitive files such as /etc/passwd.

If the server responds with a 200 OK status and the contents of the specified file are accessible or forwarded, the system is vulnerable.

Example command using curl (replace <token> with a valid authentication token):

  • curl -X POST https://<openclaw-host>/tools/invoke -H "Authorization: Bearer <token>" -H "Content-Type: application/json" -d '{"action":"a2ui_push","params":{"jsonlPath":"/etc/passwd"}}'

A 401 Unauthorized response indicates lack of authentication, while a 200 OK with file contents indicates vulnerability.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update OpenClaw to version 2026.2.21 or later, where the vulnerability has been patched by adding proper path validation and restrictions.

Until the update can be applied, restrict access to the OpenClaw canvas gateway endpoint to trusted users only, ensuring that only authenticated and authorized users can reach this service.

Additionally, monitor logs for suspicious POST requests to /tools/invoke with the a2ui_push action and unexpected file path parameters.

Consider implementing network-level controls such as firewall rules or API gateway policies to limit access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart