<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Local-File-Inclusion — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/local-file-inclusion/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 18 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/local-file-inclusion/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Webchat Media Embedding Local-Root Containment Bypass</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-local-root-bypass/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-local-root-bypass/</guid><description>A vulnerability in OpenClaw versions 2026.4.7 to before 2026.4.15 allows a crafted tool-result media reference to cause the host to attempt local file reads or Windows UNC/network path access, potentially disclosing files or network credentials.</description><content:encoded><![CDATA[<p>OpenClaw versions 2026.4.7 through 2026.4.14 are vulnerable to a local-root containment bypass in the webchat media embedding feature. This flaw allows a malicious actor to craft a tool-result media reference with a local file path or UNC path that bypasses the intended <code>localRoots</code> containment policy. The vulnerability resides in the handling of media paths during webchat media block preparation on the host side. Successful exploitation could lead to the disclosure of allowed host files or the exposure of network credentials on Windows systems. The issue was reported by @Kherrisan and patched in OpenClaw version 2026.4.15.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious tool-result that contains a media reference with a file path intended to bypass local-root containment (e.g., a path outside the allowed <code>localRoots</code>).</li>
<li>The user interacts with the malicious tool-result within the OpenClaw webchat interface.</li>
<li>The webchat media embedding functionality attempts to normalize the media reference.</li>
<li>Due to the vulnerability, the crafted file path bypasses the <code>localRoots</code> containment check.</li>
<li>The host system attempts to read the file from the specified path (either local or UNC).</li>
<li>If successful, the file content is potentially exposed. On Windows, the system might attempt to access a UNC path, potentially exposing network credentials.</li>
<li>The webchat media block is prepared with the (potentially exposed) file content.</li>
<li>Although the vulnerability is triggered host-side before the user sees the final rendered result, sensitive information could be leaked.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to the disclosure of sensitive files on the host system. On Windows systems, exploitation may result in the exposure of network credentials if a UNC path is accessed. While the severity is medium because exploitation depends on a tool-result media path reaching the webchat embedding path, the sink is a host-side file read before the user sees the rendered result. This impacts OpenClaw installations running versions 2026.4.7 through 2026.4.14.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.15 or later to patch the vulnerability. The fix hardens the webchat media path and shared media resolver, rejecting remote-host <code>file://</code> URLs and Windows network paths.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious OpenClaw UNC Path Access</code> to identify attempts to access UNC paths via OpenClaw.</li>
<li>Review the code changes in commits <code>1470de5d3e0970856d86cd99336bb8ada3fe87da</code>, <code>6e58f1f9f54bca1fea1268ec0ee4c01a2af03dde</code>, and <code>52ef42302ead9e183e6c8810e0a04ee4ef8ae9fc</code> to understand the implemented security measures in version 2026.4.15.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>openclaw</category><category>local-file-inclusion</category><category>unc-path</category></item></channel></rss>