Impact
The vulnerability originates in OpenClaw’s fetchRemoteMedia function. When a media download fails, the original Telegram file URL, which contains the bot’s authentication token, is inserted into an error string. This string is then logged or displayed to users, exposing the token to anyone with log or error surface access. The exposed token allows an attacker to take over the bot, potentially sending messages, retrieving private data, or executing commands. The weakness is an information‑disclosure flaw (CWE‑532).
Affected Systems
The issue affects all OpenClaw deployments using the fetchRemoteMedia routine that run versions prior to 2026.3.13. Any installation of the open‑source bot or media server that has not applied the 2026.3.13 update remains vulnerable.
Risk and Exploitability
With a CVSS score of 8.7 the flaw carries high severity. Although EPSS data is unavailable, the bug can be triggered simply by causing a media download to fail— for example with a malformed URL or network interruption. The token leakage occurs immediately and does not require elevation of privileges, making the attack surface broad. The vulnerability is not yet listed in the CISA KEV catalog, but its ease of exploitation and potential to compromise a bot warrant prompt action.
OpenCVE Enrichment