Impact
OpenClaw, a personal AI assistant, contains a flaw in its Feishu extension where the sendMediaFeishu function treats attacker‑provided mediaUrl values as direct local filesystem paths. This allows read access to arbitrary local files, exposing sensitive data such as /etc/passwd. The weakness is a path‑traversal error (CWE‑22) that can compromise confidentiality.
Affected Systems
The vulnerability affects all versions of OpenClaw released before 2026.2.14. Users running these older releases with the Feishu extension enabled are susceptible to exploitation.
Risk and Exploitability
The CVSS score is 7.5, indicating a high severity. EPSS is below 1%, suggesting a low short‑term exploitation probability. The vulnerability is not listed in the KEV catalog. The attack vector is likely achieved by influencing tool calls through the Feishu extension, possibly via prompt injection or direct manipulation of tool inputs. No explicit remote exploitation mechanism is described beyond controlling the mediaUrl parameter.
OpenCVE Enrichment
Github GHSA