CVE-2026-34510
Severity CVSS v4.0:
MEDIUM
Type:
Unavailable / Other
Publication date:
01/04/2026
Last modified:
01/04/2026
Description
OpenClaw before 2026.3.22 contains a path traversal vulnerability in Windows media loaders that accepts remote-host file URLs and UNC-style paths before local-path validation. Attackers can exploit this by providing network-hosted file targets that are treated as local content, bypassing intended access restrictions.
Impact
Base Score 4.0
6.90
Severity 4.0
MEDIUM
Base Score 3.x
5.30
Severity 3.x
MEDIUM
References to Advisories, Solutions, and Tools
- https://github.com/openclaw/openclaw/commit/4fd7feb0fd4ec16c48ed983980dba79a09b3aaf5
- https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87
- https://github.com/openclaw/openclaw/commit/93880717f1cd34feaa45e74e939b7a5256288901
- https://github.com/openclaw/openclaw/security/advisories/GHSA-h3x4-hc5v-v2gm
- https://www.vulncheck.com/advisories/openclaw-remote-file-url-acceptance-in-windows-media-loaders



