GHSA-mr34-9552-qr95: Arbitrary File Disclosure and NTLM Leak in OpenClaw Webchat Media Processing
Vulnerability ID: GHSA-MR34-9552-QR95
CVSS Score: 8.6
Published: 2026-04-17
OpenClaw versions prior to 2026.4.15 contain a critical path traversal and security containment bypass vulnerability. The gateway fails to enforce local filesystem boundaries when processing tool-result media payloads, enabling malicious plugins to disclose arbitrary files or leak Windows NTLM credentials via outbound Server Message Block (SMB) requests.
TL;DR
A path traversal and trust bypass in OpenClaw allows attacker-controlled plugins to read arbitrary local files or leak NTLM credentials via crafted tool-result payloads.
⚠️ Exploit Status: POC
Technical Details
- Vulnerability Type: Improper Limitation of a Pathname (CWE-22) / Identity Confusion (CWE-178)
- CVSS Score: 8.6 (High)
- Attack Vector: Network
- Authentication: Low Privileges Required (Plugin execution)
- Exploit Maturity: Proof of Concept
- Impact: Arbitrary File Read / NTLM Credential Leak
Affected Systems
- OpenClaw
-
openclaw: < 2026.4.15 (Fixed in:
2026.4.15)
Code Analysis
Commit: 1470de5
fix(webchat): reject remote-host file:// URLs in media embedding path
Commit: 6e58f1f
fix(gateway): enforce localRoots containment on webchat audio embedding path
Commit: 52ef423
fix: tighten trusted tool media passthrough
Mitigation Strategies
- Upgrade the openclaw npm package to version 2026.4.15 or later.
- Block outbound SMB traffic (TCP ports 139 and 445) from the gateway server at the network firewall.
- Disable or audit third-party plugins and tools running within the OpenClaw environment.
Remediation Steps:
- Identify all running instances of OpenClaw within the infrastructure.
- Update the project dependencies using
npm install openclaw@^2026.4.15. - Restart the OpenClaw gateway services to apply the updated application logic.
- Review gateway configuration to ensure
localRootsis strictly defined and necessary. - Review network firewall rules to ensure outbound SMB is restricted to trusted subnets only.
References
- GitHub Advisory GHSA-mr34-9552-qr95
- GitLab Advisory Database (GLAD) Entry
- OpenClaw Security Documentation
Read the full report for GHSA-MR34-9552-QR95 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)