CVE-2026-32008
HIGH
7,1
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
MEDIUM
6,5
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none
Description
AI Translation Available
OpenClaw versions prior to 2026.2.21 contain an improper URL scheme validation vulnerability in the assertBrowserNavigationAllowed() function that allows authenticated users with browser-tool access to navigate to file:// URLs. Attackers can exploit this by accessing local files readable by the OpenClaw process user through browser snapshot and extraction actions to exfiltrate sensitive data.
610
Externally Controlled Reference to a Resource in Another Sphere
DraftCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Access Control
Potential Impacts:
Read Application Data
Modify Application Data
Gain Privileges Or Assume Identity
Applicable Platforms
All platforms may be affected
https://github.com/openclaw/openclaw/commit/220bd95eff6838234e8b4b711f86d4565e1…
https://github.com/openclaw/openclaw/security/advisories/GHSA-45cg-2683-gfmq
https://www.vulncheck.com/advisories/openclaw-arbitrary-local-file-read-via-bro…