GHSA-RWJ8-P9VQ-25GV: OpenClaw BlueBubbles: When Your iMessage Bridge Becomes a Spy

Published: (February 18, 2026 at 02:40 PM EST)
1 min read
Source: Dev.to

Source: Dev.to

Vulnerability Overview

  • Vulnerability ID: GHSA-RWJ8-P9VQ-25GV
  • CVSS Score: 8.6 (High)
  • Published: 2026-02-18
  • CWE: CWE‑22 – Path Traversal
  • Attack Vector: Network
  • Privileges Required: Low/None (Context Dependent)
  • Impact: Information Disclosure

A critical path‑traversal flaw existed in the OpenClaw BlueBubbles extension. By manipulating the media delivery pipeline, an attacker could cause the system to read arbitrary files (e.g., /etc/passwd, SSH keys, password hashes) and send their contents as iMessage attachments.

Technical Details

The vulnerability stemmed from the sendBlueBubblesMedia function, which failed to enforce directory containment checks. Consequently, a crafted request could reference files outside the intended media directory, leading to full information disclosure.

Exploit Flow

  1. An attacker (or a compromised AI) sends a message to the bot requesting it to attach a system file.
  2. The extension resolves the provided path without proper validation.
  3. The file is read and transmitted as a media attachment to the iMessage chat.

Fixed Version

  • Affected: OpenClaw BlueBubbles 
  • GHSA Advisory:

Read the full report for GHSA‑RWJ8‑P9VQ‑25GV on the advisory website for interactive diagrams and a complete exploit analysis.

0 views
Back to Blog

Related posts

Read more »

OpenClaw Is Unsafe By Design

OpenClaw Is Unsafe By Design The Cline Supply‑Chain Attack Feb 17 A popular VS Code extension, Cline, was compromised. The attack chain illustrates several AI‑...