Cyber Posture

CVE-2026-32033

MediumPublic PoC

Published: 19 March 2026

Published
19 March 2026
Modified
25 March 2026
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0006 18.9th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32033 is a medium-severity Path Traversal (CWE-22) vulnerability in Openclaw Openclaw. Its CVSS base score is 6.5 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 18.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Data from Local System (T1005) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the path traversal vulnerability by requiring timely patching to OpenClaw version 2026.2.24 or later, addressing the canonicalization mismatch.

prevent

Ensures validation of file path inputs to block @-prefixed absolute paths that bypass workspace-only file-system boundaries.

prevent

Enforces access control policies restricting reads to workspace files only, mitigating exploitation even with crafted traversal paths.

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Path traversal in network-accessible app (PR:L) directly enables T1190 exploitation for unauthorized local file access and T1005 arbitrary data collection from the filesystem (e.g., /etc/passwd).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw versions prior to 2026.2.24 contain a path traversal vulnerability where @-prefixed absolute paths bypass workspace-only file-system boundary validation due to canonicalization mismatch. Attackers can exploit this by crafting @-prefixed paths like @/etc/passwd to read files outside the intended workspace…

more

boundary when tools.fs.workspaceOnly is enabled.

Deeper analysisAI

CVE-2026-32033, published on 2026-03-19, is a path traversal vulnerability (CWE-22) in OpenClaw versions prior to 2026.2.24. It affects the workspace-only file-system boundary validation enabled by the tools.fs.workspaceOnly setting. Due to a canonicalization mismatch, attackers can bypass restrictions using @-prefixed absolute paths, such as @/etc/passwd, to access files outside the intended workspace.

The vulnerability carries a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). Low-privileged remote users (PR:L) can exploit it over the network with low attack complexity and no user interaction. Exploitation allows arbitrary file reads beyond the workspace boundary, compromising high confidentiality without impacting integrity or availability.

Mitigation requires upgrading to OpenClaw version 2026.2.24 or later, as implemented in the patch commit at https://github.com/openclaw/openclaw/commit/9ef0fc2ff8fa7b145d1e746d6eb030b1bf692260. Further details are provided in the GitHub security advisory at https://github.com/openclaw/openclaw/security/advisories/GHSA-27cr-4p5m-74rj and the VulnCheck advisory at https://www.vulncheck.com/advisories/openclaw-path-traversal-via-prefixed-absolute-paths-in-workspace-boundary-validation.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.2.24

CVEs Like This One

CVE-2026-32030Same product: Openclaw Openclaw
CVE-2026-33581Same product: Openclaw Openclaw
CVE-2026-28462Same product: Openclaw Openclaw
CVE-2026-32026Same product: Openclaw Openclaw
CVE-2026-32846Same product: Openclaw Openclaw
CVE-2026-22171Same product: Openclaw Openclaw
CVE-2026-28453Same product: Openclaw Openclaw
CVE-2026-35668Same product: Openclaw Openclaw
CVE-2026-32055Same product: Openclaw Openclaw
CVE-2026-28482Same product: Openclaw Openclaw

References