{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4040","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-12T06:46:15.510Z","datePublished":"2026-03-12T12:02:14.140Z","dateUpdated":"2026-03-12T13:08:57.088Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-12T12:02:14.140Z"},"title":"OpenClaw File Existence tools.exec.safeBins information exposure","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-203","lang":"en","description":"Information Exposure Through Discrepancy"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-200","lang":"en","description":"Information Disclosure"}]}],"affected":[{"vendor":"n/a","product":"OpenClaw","versions":[{"version":"2026.2.0","status":"affected"},{"version":"2026.2.1","status":"affected"},{"version":"2026.2.2","status":"affected"},{"version":"2026.2.3","status":"affected"},{"version":"2026.2.4","status":"affected"},{"version":"2026.2.5","status":"affected"},{"version":"2026.2.6","status":"affected"},{"version":"2026.2.7","status":"affected"},{"version":"2026.2.8","status":"affected"},{"version":"2026.2.9","status":"affected"},{"version":"2026.2.10","status":"affected"},{"version":"2026.2.11","status":"affected"},{"version":"2026.2.12","status":"affected"},{"version":"2026.2.13","status":"affected"},{"version":"2026.2.14","status":"affected"},{"version":"2026.2.15","status":"affected"},{"version":"2026.2.16","status":"affected"},{"version":"2026.2.17","status":"affected"},{"version":"2026.2.19-beta.1","status":"unaffected"}],"cpes":["cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:*:*:*"],"modules":["File Existence Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in OpenClaw up to 2026.2.17. This issue affects the function tools.exec.safeBins of the component File Existence Handler. The manipulation leads to information exposure through discrepancy. The attack needs to be performed locally. Upgrading to version 2026.2.19-beta.1 is capable of addressing this issue. The identifier of the patch is bafdbb6f112409a65decd3d4e7350fbd637c7754. Upgrading the affected component is advised."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:X/RL:O/RC:C","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:X/RL:O/RC:C","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":1.7,"vectorString":"AV:L/AC:L/Au:S/C:P/I:N/A:N/E:ND/RL:OF/RC:C"}}],"timeline":[{"time":"2026-03-12T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-12T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-12T07:51:24.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"nedlir (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.350652","name":"VDB-350652 | OpenClaw File Existence tools.exec.safeBins information exposure","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.350652","name":"VDB-350652 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.769581","name":"Submit #769581 | openclaw 2026.2.17 Information Disclosure","tags":["third-party-advisory"]},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-6c9j-x93c-rw6j","tags":["related"]},{"url":"https://github.com/openclaw/openclaw/commit/bafdbb6f112409a65decd3d4e7350fbd637c7754","tags":["patch"]},{"url":"https://github.com/openclaw/openclaw/releases/tag/v2026.2.19-beta.1","tags":["patch"]},{"url":"https://github.com/openclaw/openclaw/","tags":["product"]}],"tags":["x_open-source"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-12T13:08:04.596893Z","id":"CVE-2026-4040","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-12T13:08:57.088Z"}}]}}