Platform
nodejs
Component
openclaw
Fixed in
2026.2.19
2026.2.19
CVE-2026-32030 describes a confidentiality vulnerability in openclaw, a Node.js package. This flaw allows an attacker to stage arbitrary files on the remote host via SCP if iMessage remote attachment fetching is enabled. The vulnerability affects versions of openclaw up to 2026.2.17, and a fix is available in version 2026.2.19.
The vulnerability stems from insufficient validation of file paths when handling iMessage remote attachments. When channels.imessage.remoteHost is enabled, the stageSandboxMedia function accepts arbitrary absolute paths. An attacker could craft a malicious iMessage attachment request containing a path outside of the expected iMessage attachment directories. This crafted request would then trigger the system to use SCP to copy the specified file into a local staging area. This allows an attacker to potentially read sensitive files from the remote host, leading to data exfiltration and potential compromise of the system.
This CVE was published on 2026-03-03. No public proof-of-concept (PoC) code has been released as of this writing. The vulnerability's impact is primarily focused on confidentiality, and its exploitation probability is currently considered low, pending the release of a PoC. It is not currently listed on the CISA KEV catalog.
Exploit Status
EPSS
0.07% (21% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2026-32030 is to upgrade openclaw to version 2026.2.19 or later, which includes remote attachment path validation. If upgrading is not immediately feasible, disable the channels.imessage.remoteHost setting to prevent remote attachment fetching. Monitor system logs for unusual SCP activity or file access attempts. Consider implementing a Web Application Firewall (WAF) to filter malicious iMessage attachment requests, although this is not a complete solution.
Update OpenClaw to version 2026.2.19 or later. This corrects the path traversal vulnerability in the stageSandboxMedia function by correctly validating remote attachment paths.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-32030 is a HIGH severity vulnerability in openclaw affecting versions up to 2026.2.17. It allows attackers to stage arbitrary files via SCP, potentially exposing confidential data if iMessage remote attachment fetching is enabled.
You are affected if you are using openclaw versions up to 2026.2.17 and have channels.imessage.remoteHost enabled. Check your installed version with npm list openclaw.
Upgrade openclaw to version 2026.2.19 or later. Alternatively, disable channels.imessage.remoteHost to prevent remote attachment fetching.
As of now, there are no confirmed reports of active exploitation. However, the vulnerability's potential impact warrants prompt remediation.
Refer to the openclaw project's release notes and repository for the latest information and advisory regarding CVE-2026-32030.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.