Cyber Posture

CVE-2026-22171

HighPublic PoC

Published: 18 March 2026

Published
18 March 2026
Modified
19 March 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0008 23.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22171 is a high-severity Path Traversal (CWE-22) vulnerability in Openclaw Openclaw. Its CVSS base score is 8.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 23.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly validates untrusted Feishu media keys prior to interpolation into temporary file paths, preventing path traversal exploitation.

prevent

Remediates the path traversal flaw in OpenClaw by identifying, reporting, and applying patches such as those in version 2026.2.19.

prevent

Limits the OpenClaw process to least privilege, restricting the scope and impact of arbitrary file writes via path traversal.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Path traversal in public-facing OpenClaw media handler directly enables remote unauthenticated arbitrary file write via exploitation of the application.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw versions prior to 2026.2.19 contain a path traversal vulnerability in the Feishu media download flow where untrusted media keys are interpolated directly into temporary file paths in extensions/feishu/src/media.ts. An attacker who can control Feishu media key values returned to…

more

the client can use traversal segments to escape os.tmpdir() and write arbitrary files within the OpenClaw process permissions.

Deeper analysisAI

CVE-2026-22171, published on 2026-03-18, is a path traversal vulnerability (CWE-22) in OpenClaw versions prior to 2026.2.19. The flaw exists in the Feishu media download flow within the file extensions/feishu/src/media.ts, where untrusted media keys provided by Feishu are directly interpolated into temporary file paths based on os.tmpdir().

A remote, unauthenticated attacker (AV:N/AC:L/PR:N/UI:N) who can control Feishu media key values returned to the client can exploit this vulnerability by injecting traversal segments, such as "../", to escape the intended temporary directory. This allows the attacker to write arbitrary files within the permissions of the OpenClaw process, resulting in high confidentiality impact (C:H), low integrity impact (I:L), and no availability impact (A:N). The CVSS v3.1 base score is 8.2 with unchanged scope (S:U).

Mitigation is addressed in OpenClaw commits c821099157a9767d4df208c6b12f214946507871, cdb00fe2428000e7a08f9b7848784a0049176705, and ec232a9e2dff60f0e3d7e827a7c868db5254473f, with users advised to upgrade to version 2026.2.19 or later. Further details are provided in the GitHub security advisory at GHSA-vj3g-5px3-gr46 and the VulnCheck advisory at https://www.vulncheck.com/advisories/openclaw-path-traversal-in-feishu-media-temporary-file-naming.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.2.19

CVEs Like This One

CVE-2026-28453Same product: Openclaw Openclaw
CVE-2026-32030Same product: Openclaw Openclaw
CVE-2026-33581Same product: Openclaw Openclaw
CVE-2026-28462Same product: Openclaw Openclaw
CVE-2026-32026Same product: Openclaw Openclaw
CVE-2026-32036Same product: Openclaw Openclaw
CVE-2026-32055Same product: Openclaw Openclaw
CVE-2026-32846Same product: Openclaw Openclaw
CVE-2026-32033Same product: Openclaw Openclaw
CVE-2026-28457Same product: Openclaw Openclaw

References