VulnerabilitiesHIGH

OpenClaw Vulnerability - File Disclosure via Protocol Injection

FDFull Disclosure
OpenClawCVE-2026-22172CVE-2026-27522CVE-2026-32051GitHub Security Advisory
🎯

Basically, a flaw in OpenClaw lets users steal files from chats without permission.

Quick Summary

A vulnerability in OpenClaw allows group chat members to access sensitive files through prompt injection. This affects users on Discord, Telegram, and WhatsApp. It's crucial to update the platform to the latest version to mitigate risks.

What Happened

A serious file disclosure vulnerability has been discovered in OpenClaw, an AI personal assistant platform. This flaw allows any member of a group chat on platforms like Discord, Telegram, or WhatsApp to exfiltrate sensitive local files. These files can include critical data such as API keys, conversation histories, and system prompts. The vulnerability, reported on March 21, 2026, was silently fixed the next day, but the report was closed without acknowledgment of the issue.

The attack exploits the MEDIA: output protocol, which processes commands without requiring any authentication. This means that even a regular group chat member can execute commands to access sensitive files, bypassing all permission controls. The implications of this vulnerability are significant, as it can lead to unauthorized access to sensitive information.

Who's Affected

The vulnerability affects users of OpenClaw versions 2026.3.13 and earlier. Anyone using this platform for group chats is at risk, particularly those who may not be aware of the flaw. Since the vulnerability allows any group member to access files, it poses a threat to both individual users and organizations utilizing OpenClaw for communication.

The silent nature of the fix raises concerns about how vulnerabilities are handled within the platform. Users may not be aware that their data could be at risk, leading to potential exploitation. This lack of transparency can undermine trust in the platform.

What Data Was Exposed

The vulnerability allows attackers to exfiltrate various sensitive files, including:

  • LLM provider API keys: These keys are crucial for accessing language model services.
  • Conversation history: This could contain sensitive discussions and data shared within the chat.
  • System prompts: These may include instructions or configurations that could be exploited further.

The attack scenario demonstrates how easily an attacker can exploit this flaw. By simply sending a specific command, they can receive sensitive files as attachments in the chat, making it a straightforward yet dangerous exploit.

What You Should Do

If you are using OpenClaw, it is crucial to update to version 2026.3.22 or later to mitigate this vulnerability. Ensure that your platform is running the latest version to protect against potential exploitation. Additionally, consider reviewing your chat group settings and permissions to limit access to sensitive information.

Stay informed about vulnerabilities and security advisories related to OpenClaw. Regularly check for updates and patches, and engage with the community to share experiences and solutions. Awareness and proactive measures are key to maintaining security in your communications.

🔒 Pro insight: The silent fix and denial of vulnerability status highlight a concerning trend in vulnerability disclosure practices within the OpenClaw community.

Original article from

FDFull Disclosure
Read Full Article

Related Pings

HIGHVulnerabilities

Safari 26.4 - Critical Vulnerabilities Addressed

Apple has released Safari 26.4 to fix serious vulnerabilities in WebKit. This update is crucial for macOS users to protect against potential exploits. Make sure to update your software for enhanced security.

Full Disclosure·
HIGHVulnerabilities

Xcode 26.4 - Critical Security Update Released

Apple has rolled out Xcode 26.4 to fix serious vulnerabilities in macOS Tahoe. Developers should update immediately to prevent system crashes and unauthorized file access. Stay secure and keep your tools up to date!

Full Disclosure·
HIGHVulnerabilities

libfuse io_uring Vulnerabilities - Critical Memory Flaws Found

Two critical memory safety vulnerabilities were discovered in libfuse's io_uring code path. These flaws could lead to crashes or arbitrary code execution. Immediate updates are advised.

Full Disclosure·
HIGHVulnerabilities

MailEnable Vulnerabilities - Multiple XSS Flaws Discovered

MailEnable has multiple reflected XSS vulnerabilities in versions 10.54 and earlier. Users are at risk of arbitrary script execution. Upgrade to version 10.55 to stay protected.

Full Disclosure·
HIGHVulnerabilities

Dovecot Security Advisory - Multiple Vulnerabilities Fixed

Dovecot has released a security advisory addressing multiple vulnerabilities. Users of Dovecot Pro and CE versions must update to prevent potential exploits. This advisory highlights critical flaws affecting user authentication and data integrity.

Full Disclosure·
HIGHVulnerabilities

Apple's tvOS 26.4 - Critical Security Updates Released

Apple has rolled out tvOS 26.4, fixing multiple serious vulnerabilities. Users of Apple TV HD and 4K need to update immediately to safeguard their devices against potential attacks. This update is crucial for maintaining device security.

Full Disclosure·