CVE-2026-41366
Local File Read via Self-Whitelisting Flaw in OpenClaw
Publication date: 2026-04-28
Last updated on: 2026-04-28
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.3.31 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-732 | The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-41366 is a vulnerability in OpenClaw versions before 2026.3.31 involving a local roots self-whitelisting flaw in the function appendLocalMediaParentRoots.
This flaw allows a model to initiate arbitrary host file reads by improperly validating media parent directories, which leads to unauthorized expansion of filesystem roots that the system trusts.
Attackers can exploit this to exfiltrate sensitive files and credentials from the host system by tricking the system into including unauthorized directories as trusted local roots.
How can this vulnerability impact me? :
This vulnerability can allow attackers with some level of access to read arbitrary files on the host system that should be restricted.
By exploiting the improper validation of media parent directories, attackers can exfiltrate credentials and other sensitive information stored in files on the host.
The impact includes unauthorized disclosure of sensitive data, which could lead to further compromise or privilege escalation.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the vulnerability CVE-2026-41366, you should upgrade OpenClaw to version 2026.3.31 or later, as this version contains the fix that removes the self-whitelisting behavior in appendLocalMediaParentRoots.
The fix prevents the local roots from being widened based on media source paths, thereby restricting unauthorized filesystem access and preventing arbitrary host file reads.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in OpenClaw allows attackers to exfiltrate credentials and access sensitive files by exploiting improper validation of media parent directories. This unauthorized access to sensitive data could lead to non-compliance with data protection regulations such as GDPR and HIPAA, which require strict controls over access to personal and sensitive information.
Specifically, the flaw enables arbitrary host file reads, potentially exposing confidential information that must be protected under these standards. Organizations using affected versions of OpenClaw may face increased risk of data breaches and regulatory penalties if this vulnerability is exploited.
The fix implemented in version 2026.3.31 mitigates this risk by preventing the system from implicitly trusting or including arbitrary filesystem locations based on media file paths, thereby reducing the chance of unauthorized data exposure.