Plattform
nodejs
Komponente
openclaw
Behoben in
2026.2.18
CVE-2026-3689 is a Path Traversal vulnerability identified in OpenClaw, allowing for information disclosure. This flaw stems from insufficient validation of user-supplied paths within the canvas gateway endpoint, enabling attackers to access files they shouldn't. The vulnerability affects OpenClaw versions 2026.2.17 and earlier. A fix is expected to be released by the OpenClaw development team.
An attacker exploiting CVE-2026-3689 can leverage the path traversal flaw to read files outside of the intended directory. Because authentication is required, the attacker must first authenticate to the system. Successful exploitation allows the attacker to disclose sensitive information accessible to the service account under which OpenClaw is running. This could include configuration files, database credentials, or other sensitive data. The blast radius is limited to the data accessible by the service account, but the potential for data exposure remains significant. While the vulnerability requires authentication, the ease of path traversal exploitation could make it attractive to attackers with compromised credentials.
CVE-2026-3689 was published on 2026-04-11. The vulnerability was reported to ZDI as ZDI-CAN-29312. The vulnerability's exploitation probability is currently assessed as medium, given the requirement for authentication and the potential complexity of crafting a malicious path. No public proof-of-concept (POC) code has been publicly released at the time of writing, but the relatively straightforward nature of path traversal vulnerabilities suggests that a POC may emerge. Monitor security advisories and threat intelligence feeds for updates.
Organizations deploying OpenClaw, particularly those with publicly accessible canvas gateway endpoints, are at risk. Shared hosting environments where multiple users share the same OpenClaw instance are also particularly vulnerable, as an attacker compromising one user's account could potentially exploit this vulnerability to access data belonging to other users.
• linux / server:
journalctl -u openclaw -g 'canvas gateway' | grep -i "path traversal"• linux / server:
lsof -p $(pidof openclaw) | grep /path/to/sensitive/file• generic web:
curl -I http://your-openclaw-server/canvas/path/../sensitive/file.txtdisclosure
Exploit-Status
EPSS
0.28% (51% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-3689 is to upgrade to a patched version of OpenClaw as soon as it becomes available. Until a patch is applied, consider implementing stricter access controls to limit the service account's privileges and reduce the potential impact of a successful attack. Implement input validation on the canvas gateway endpoint to prevent malicious path manipulation. Web application firewalls (WAFs) configured with rules to detect and block path traversal attempts can provide an additional layer of defense. Monitor OpenClaw logs for suspicious activity, such as unusual file access patterns, to detect potential exploitation attempts.
Actualice OpenClaw a la versión corregida para mitigar la vulnerabilidad de recorrido de directorios. Verifique y fortalezca la validación de las rutas de usuario en el código fuente para prevenir futuros ataques. Implemente controles de acceso estrictos para limitar el acceso a archivos sensibles.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-3689 is a vulnerability in OpenClaw versions 2026.2.17 and earlier that allows attackers to disclose sensitive information by manipulating file paths. It's classified as a Path Traversal vulnerability with a Medium severity rating.
If you are running OpenClaw version 2026.2.17 or earlier, you are potentially affected by this vulnerability. Check your OpenClaw version and upgrade as soon as a patch is available.
The recommended fix is to upgrade to a patched version of OpenClaw. Until a patch is available, implement temporary workarounds like restricting access and validating input parameters.
As of the current assessment, there are no confirmed reports of active exploitation. However, due to the nature of path traversal vulnerabilities, exploitation is possible if a public proof-of-concept is released.
Refer to the OpenClaw project's official website and security advisories for the latest information and updates regarding CVE-2026-3689.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.