Connect Clawsmith to your coding agent. Ship products like crazy.Unlimited usage during betaGet API Key →
← Back to dashboard
clawsmith.com/signal/cve-2026-33581-mediaurl-sandbox-bypass-file-read
IssueWide OpenSecurityLive

CVE-2026-33581: OpenClaw Sandbox Bypass — Arbitrary File Read via mediaUrl/fileUrl Parameters

OpenClaw before 2026.3.24 message tool accepts mediaUrl and fileUrl aliases without sandbox localRoots validation. Attackers read arbitrary local files via file:// URIs bypassing filesystem isolation.

Product Idea from this Signal

A security service that auto-patches OpenClaw CVEs within hours of disclosure before attackers exploit them

3.7k

OpenClaw shipped 9 CVEs in 4 days (March 2026) including a CVSS 9.9 privilege escalation affecting 135K+ exposed instances. Most operators have no way to know which CVEs affect their version, no automated patching, and no coordination between the flood of advisories (156+ total) and their actual attack surface. This tool continuously monitors CVE feeds, maps each advisory to your installed version and enabled features, and applies safe mitigations automatically while queuing risky patches for human approval.

SECURITYCLIDEVTOOLOPEN-SOURCESYSADMIN
CompetitiveView Opportunity →

Frequently Asked Questions