GHSA-RWJ8-P9VQ-25GV: OpenClaw BlueBubbles: When Your iMessage Bridge Becomes a Spy
Source: Dev.to
Vulnerability Overview
- Vulnerability ID: GHSA-RWJ8-P9VQ-25GV
- CVSS Score: 8.6 (High)
- Published: 2026-02-18
- CWE: CWE‑22 – Path Traversal
- Attack Vector: Network
- Privileges Required: Low/None (Context Dependent)
- Impact: Information Disclosure
A critical path‑traversal flaw existed in the OpenClaw BlueBubbles extension. By manipulating the media delivery pipeline, an attacker could cause the system to read arbitrary files (e.g., /etc/passwd, SSH keys, password hashes) and send their contents as iMessage attachments.
Technical Details
The vulnerability stemmed from the sendBlueBubblesMedia function, which failed to enforce directory containment checks. Consequently, a crafted request could reference files outside the intended media directory, leading to full information disclosure.
Exploit Flow
- An attacker (or a compromised AI) sends a message to the bot requesting it to attach a system file.
- The extension resolves the provided path without proper validation.
- The file is read and transmitted as a media attachment to the iMessage chat.
Fixed Version
- Affected: OpenClaw BlueBubbles
- GHSA Advisory:
Read the full report for GHSA‑RWJ8‑P9VQ‑25GV on the advisory website for interactive diagrams and a complete exploit analysis.