Description
OpenClaw before 2026.4.8 treats shared reply MEDIA paths as trusted, allowing crafted references to trigger cross-channel local file exfiltration. Attackers can exploit this by crafting malicious shared reply MEDIA references to cause another channel to read local file paths as trusted generated media.
Problem types
CWE-73: External Control of File Name or Path
Product status
Any version before 2026.4.8
2026.4.8 (semver)
Credits
Yuki Shiroi (@threalwinky)
References
github.com/...enclaw/security/advisories/GHSA-qqq7-4hxc-x63c (GitHub Security Advisory (GHSA-qqq7-4hxc-x63c))
github.com/...ommit/d7c3210cd6f5fdfdc1beff4c9541673e814354d5 (Patch Commit)
www.vulncheck.com/...filtration-via-shared-reply-media-paths (VulnCheck Advisory: OpenClaw < 2026.4.8 - Local File Exfiltration via Shared Reply MEDIA Paths)