Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r8g4-86fx-92mq | OpenClaw Vulnerable to Local File Inclusion via MEDIA: Path Extraction |
Fri, 13 Feb 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
Thu, 05 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Feb 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Vendors & Products |
Openclaw
Openclaw openclaw |
Wed, 04 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw is a personal AI assistant. Prior to version 2026.1.30, the isValidMedia() function in src/media/parse.ts allows arbitrary file paths including absolute paths, home directory paths, and directory traversal sequences. An agent can read any file on the system by outputting MEDIA:/path/to/file, exfiltrating sensitive data to the user/channel. This issue has been patched in version 2026.1.30. | |
| Title | OpenClaw Vulnerable to Local File Inclusion via MEDIA: Path Extraction | |
| Weaknesses | CWE-200 CWE-22 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-05T14:32:36.477Z
Reserved: 2026-02-02T16:31:35.820Z
Link: CVE-2026-25475
Updated: 2026-02-05T14:20:15.536Z
Status : Analyzed
Published: 2026-02-04T20:16:07.287
Modified: 2026-02-13T14:42:29.397
Link: CVE-2026-25475
No data.
OpenCVE Enrichment
Updated: 2026-04-17T23:30:15Z
Github GHSA