PatchSiren cyber security CVE debrief
CVE-2026-32846 OpenClaw CVE debrief
CVE-2026-32846 is a high-severity path traversal issue in OpenClaw’s media parsing flow. As published by NVD on 2026-03-26 and last modified on 2026-05-20, the flaw can let attackers bypass path validation and read arbitrary files outside the intended sandbox, including sensitive local files.
- Vendor
- OpenClaw
- Product
- Unknown
- CVSS
- HIGH 8.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-03-26
- Original CVE updated
- 2026-05-20
- Advisory published
- 2026-03-26
- Advisory updated
- 2026-05-20
Who should care
Operators of OpenClaw deployments, especially systems that parse user-supplied media or accept file/path input; security teams responsible for application hardening and secrets exposure prevention.
Technical summary
The supplied description says incomplete validation in isLikelyLocalPath() and isValidMedia(), combined with an allowBareFilename bypass, allows paths outside the application sandbox. NVD’s CPE criteria mark openclaw:openclaw versions through 2026.3.23 as vulnerable, and the description indicates the issue is fixed before 2026.3.28. The impact is disclosure of arbitrary files rather than code execution.
Defensive priority
High — arbitrary file read in a parser exposed to untrusted input warrants prompt patching and review for sensitive-data exposure.
Recommended defensive actions
- Upgrade OpenClaw to 2026.3.28 or later, or to the vendor-fixed release referenced by the patch commit.
- Restrict or disable any media parsing paths that accept user-controlled filenames or paths until patched.
- Review application and host logs for suspicious reads of system files, environment files, SSH keys, or other secrets.
- Confirm sandboxing and allowlist checks cannot be bypassed by bare filenames or path normalization edge cases.
- Rotate exposed secrets if there is any chance local files were readable through the affected path.
Evidence notes
The evidence set includes the NVD modified record, a patch commit, a pull request used for issue tracking/vendor advisory context, a third-party advisory, and a referenced GitHub advisory link. NVD lists the vulnerable CPE range as openclaw:openclaw up to and including 2026.3.23. The corpus also marks the GitHub advisory URL as broken, so the patch commit and NVD record are the most reliable references here.
Official resources
-
CVE-2026-32846 CVE record
CVE.org
-
CVE-2026-32846 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Patch
-
Mitigation or vendor reference
[email protected] - Exploit, Issue Tracking, Vendor Advisory
-
Source reference
[email protected] - Broken Link
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Publicly disclosed in NVD on 2026-03-26 and modified on 2026-05-20; no CISA KEV entry is present in the supplied enrichment.