Moderate severityNVD Advisory· Published Feb 4, 2026· Updated Feb 5, 2026
OpenClaw Vulnerable to Local File Inclusion via MEDIA: Path Extraction
CVE-2026-25475
Description
OpenClaw is a personal AI assistant. Prior to version 2026.1.30, the isValidMedia() function in src/media/parse.ts allows arbitrary file paths including absolute paths, home directory paths, and directory traversal sequences. An agent can read any file on the system by outputting MEDIA:/path/to/file, exfiltrating sensitive data to the user/channel. This issue has been patched in version 2026.1.30.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
openclawnpm | < 2026.1.30 | 2026.1.30 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-r8g4-86fx-92mqghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-25475ghsaADVISORY
- github.com/openclaw/openclaw/security/advisories/GHSA-r8g4-86fx-92mqghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.