Impact
OpenClaw versions older than 2026.2.19 contain a path traversal flaw in the Feishu media download flow where untrusted media key values are interpolated directly into temporary file paths in extensions/feishu/src/media.ts. An attacker who can control the media key values returned to the client can craft traversal segments to escape os.tmpdir(), allowing them to write arbitrary files within the OpenClaw process permissions. This capability can be used to place malicious executables or modify critical configuration files, potentially leading to arbitrary code execution, privilege escalation, or data corruption.
Affected Systems
All OpenClaw deployments running a version prior to 2026.2.19 are affected. The product runs under Node.js as indicated by the CPE entry. Any installation that exposes the Feishu media interface is at risk.
Risk and Exploitability
The CVSS score of 8.8 classifies this as a high‑severity vulnerability. EPSS data is unavailable and the issue is currently not listed in the CISA KEV catalog. Exploitation can occur remotely via the Feishu media feature, provided that an attacker can influence the media key values. No elevated privilege is required beyond the normal OpenClaw process, making the attack vector broadly applicable to remote users or compromised clients. The absence of an immediate fix underscores the importance of applying remediation promptly.
OpenCVE Enrichment
Github GHSA