Path traversal in OpenClaw - #VU128813
Published: May 1, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a local user to disclose sensitive information.
The vulnerability exists due to path traversal in resolveIdentityAvatarUrl in src/gateway/session-utils.ts when processing a crafted local avatar path that follows a symlink outside the agent workspace. A local user can supply a crafted avatar path to disclose sensitive information.
The resulting file contents can be returned in gateway responses as a base64 data URL via agents.list.