Cyber Posture

CVE-2026-32030

HighPublic PoC

Published: 19 March 2026

Published
19 March 2026
Modified
25 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0007 22.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32030 is a high-severity Path Traversal (CWE-22) vulnerability in Openclaw Openclaw. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 22.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-7 (Least Functionality) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2026-32030 by requiring timely patching to OpenClaw 2026.2.19 or later, which fixes the path traversal in stageSandboxMedia.

prevent

Prevents exploitation of the path traversal vulnerability by enforcing validation of attachment path metadata inputs to reject arbitrary absolute paths.

prevent

Eliminates the vulnerability exposure by disabling unnecessary iMessage remote attachment fetching functionality.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Path traversal in public-facing OpenClaw enables remote unauthenticated file read via SCP (T1190 initial access); directly facilitates arbitrary local file collection/disclosure (T1005).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw versions prior to 2026.2.19 contain a path traversal vulnerability in the stageSandboxMedia function that accepts arbitrary absolute paths when iMessage remote attachment fetching is enabled. An attacker who can tamper with attachment path metadata can disclose files readable by…

more

the OpenClaw process on the configured remote host via SCP.

Deeper analysisAI

CVE-2026-32030 is a path traversal vulnerability (CWE-22) affecting OpenClaw versions prior to 2026.2.19, specifically in the stageSandboxMedia function. This flaw arises when iMessage remote attachment fetching is enabled, as the function accepts arbitrary absolute paths. Published on 2026-03-19, it has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with network accessibility and no privileges required.

An unauthenticated attacker who can tamper with attachment path metadata can exploit this vulnerability to disclose files readable by the OpenClaw process on the configured remote host. Exploitation occurs via SCP, allowing remote file disclosure without user interaction or elevated privileges on the target system.

Mitigation is addressed in the referenced advisories and patch. The GitHub security advisory (GHSA-x9cf-3w63-rpq9) and commit 1316e574 detail the fix, while the Vulncheck advisory provides further analysis. Security practitioners should upgrade to OpenClaw 2026.2.19 or later and disable iMessage remote attachment fetching if not required.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.2.19

CVEs Like This One

CVE-2026-33581Same product: Openclaw Openclaw
CVE-2026-28462Same product: Openclaw Openclaw
CVE-2026-32026Same product: Openclaw Openclaw
CVE-2026-32846Same product: Openclaw Openclaw
CVE-2026-32033Same product: Openclaw Openclaw
CVE-2026-22171Same product: Openclaw Openclaw
CVE-2026-28453Same product: Openclaw Openclaw
CVE-2026-35668Same product: Openclaw Openclaw
CVE-2026-32055Same product: Openclaw Openclaw
CVE-2026-28482Same product: Openclaw Openclaw

References