CVE-2026-43533
OpenClaw before 2026.4.10 contains an arbitrary file read vulnerability in QQBot media tags that allows attackers to reference host-local paths outside the intended media storage boundary. Attackers can craft malicious reply text containing media tags to disclose arbitrary local files through outbound media handling.
Ver en NVDAnálisis
OpenClaw is a niche open-source project, often associated with QQBot integrations or game engine reimplementations, which has negligible adoption in the Mexican developer ecosystem. While an arbitrary file read is a serious vulnerability, the software's deployment scale does not warrant a community-wide alert.
Severidad
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:NCWE-23EPSS
Afecta
openclaw:openclawDescripción técnica
OpenClaw before 2026.4.10 contains an arbitrary file read vulnerability in QQBot media tags that allows attackers to reference host-local paths outside the intended media storage boundary. Attackers can craft malicious reply text containing media tags to disclose arbitrary local files through outbound media handling.