top of page
perceptive_background_267k.jpg

OpenClaw versions prior to 2026.2.19 contain a path traversal vulnerability in the Feishu media download flow where untrusted media keys are interpolated direct…

Published:

17 maart 2026 om 23:00:00

Alert date:

18 maart 2026 om 15:08:05

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Enterprise Applications

OpenClaw versions prior to 2026.2.19 contain a path traversal vulnerability in the Feishu media download flow. The vulnerability exists in extensions/feishu/src/media.ts where untrusted media keys are directly interpolated into temporary file paths. An attacker who can control Feishu media key values can use directory traversal segments to escape the temporary directory and write arbitrary files within the OpenClaw process permissions. This allows unauthorized file system access and potential system compromise.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page