Home

Description

OpenClaw versions 2026.4.7 before 2026.4.10 fail to normalize Discord event cover image parameters in sandbox media processing. Attackers can bypass media normalization to inject host-local media references into channel action paths expecting normalized media.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-05 | Updated 2026-05-05 | Assigner VulnCheck




MEDIUM: 4.9CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N

HIGH: 7.7CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-184: Incomplete List of Disallowed Inputs

Product status

Default status
unaffected

2026.4.7 (semver) before 2026.4.10
affected

2026.4.10 (semver)
unaffected

Credits

Akiyama Mio (@Telecaster2147) reporter

References

github.com/...enclaw/security/advisories/GHSA-c9h3-5p7r-mrjh (GitHub Security Advisory (GHSA-c9h3-5p7r-mrjh)) vendor-advisory

github.com/...ommit/979c6f09d6fad96596feb91c905934be7e0b4f15 (Patch Commit) patch

www.vulncheck.com/...on-bypass-via-discord-event-cover-image (VulnCheck Advisory: OpenClaw 2026.4.7 < 2026.4.10 - Sandbox Media Normalization Bypass via Discord Event Cover Image) third-party-advisory

cve.org (CVE-2026-43532)

nvd.nist.gov (CVE-2026-43532)

Download JSON