CVE-2026-44996
Received Received - Intake
Arbitrary Local File Read in OpenClaw Webchat Audio Helper

Publication date: 2026-05-11

Last updated on: 2026-05-11

Assigner: VulnCheck

Description
OpenClaw before 2026.4.15 contains an arbitrary local file read vulnerability in the webchat audio embedding helper that fails to apply local media root containment checks. Attackers can influence agent or tool-produced ReplyPayload.mediaUrl parameters to resolve absolute local paths or file URLs, read audio-like files, and embed them base64-encoded into webchat responses.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-11
Last Modified
2026-05-11
Generated
2026-05-11
AI Q&A
2026-05-11
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.4.15 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-44996 is an arbitrary local file read vulnerability in OpenClaw versions before 2026.4.15. It occurs in the webchat audio embedding helper, which fails to properly enforce local media root containment checks. This flaw allows attackers to manipulate the ReplyPayload.mediaUrl parameter to reference absolute local file paths or file URLs. As a result, attackers can read audio-like files from the local filesystem and embed their base64-encoded contents into webchat responses.

The vulnerability is related to path traversal (CWE-22) and improper access control, enabling unauthorized reading of local files within the permissions of the gateway process.


How can this vulnerability impact me? :

This vulnerability can allow attackers to read arbitrary local audio-like files on the server running OpenClaw, potentially exposing sensitive information contained in those files. The contents of these files can be embedded and exposed in webchat responses, which could lead to information disclosure.

Since the vulnerability bypasses local media root containment checks, attackers might access files outside intended directories, increasing the risk of unauthorized data exposure. However, the files must be readable by the gateway process, have audio-like extensions, and fit within size limits to be exploited.

The overall severity is considered moderate (CVSS v4 score 6.3), indicating a significant but not critical risk.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves manipulation of the ReplyPayload.mediaUrl parameter in OpenClaw webchat audio embedding to read arbitrary local files. Detection involves monitoring or inspecting webchat traffic for suspicious mediaUrl parameters that contain absolute local paths or file URLs.

You can detect attempts to exploit this vulnerability by searching logs or network captures for webchat requests containing mediaUrl parameters with file paths or file:// URLs.

  • Use network traffic inspection tools (e.g., Wireshark, tcpdump) to filter HTTP requests to the webchat endpoint and look for mediaUrl parameters with suspicious local file paths.
  • Search application logs for entries containing ReplyPayload.mediaUrl values that include absolute paths or file:// URLs.
  • Example command to search logs for suspicious mediaUrl usage: grep -E 'mediaUrl=.*(file://|/)' /path/to/openclaw/logs/*
  • Example tcpdump command to capture HTTP traffic on port 80 or 443 for analysis: tcpdump -i any -A 'tcp port 80 or tcp port 443' | grep 'mediaUrl='

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to upgrade OpenClaw to version 2026.4.15 or later, where the vulnerability has been patched by enforcing strict local media root containment checks on webchat audio embedding.

Until the upgrade can be applied, avoid exposing webchat sessions to untrusted users or content that could manipulate mediaUrl parameters.

  • Apply the official patch or upgrade OpenClaw to version 2026.4.15 or newer.
  • Restrict access to the webchat interface to trusted users only.
  • Implement network-level controls or web application firewall (WAF) rules to block requests containing suspicious mediaUrl parameters with absolute local paths or file:// URLs.
  • Review and monitor logs for attempts to exploit this vulnerability.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not explicitly address how CVE-2026-44996 affects compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart