Impact
The vulnerability in OpenClaw prior to version 2026.4.20 allows trusted‑proxy callers lacking operator.read scope to bypass scope enforcement in the assistant‑media route. This bypass permits retrieval of protected media content that resides within the allowed media roots, thereby exposing sensitive data that should be restricted by scope validation. The weakness corresponds to CWE‑863: Scope Validation Error and is rated a low overall CVSS score of 2.3, indicating a limited impact but still a legitimate risk to confidentiality.
Affected Systems
OpenClaw OpenClaw software before 2026.4.20 is affected. Any installation using a version earlier than 2026.4.20 running the assistant‑media route is vulnerable.
Risk and Exploitability
The EPSS score is less than 1 %, suggesting a very low probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to require a trusted‑proxy caller; attackers can impersonate or compromise such a caller to exploit the bounded remediation path. The attack path relies on the existing identity-bearing HTTP authentication, which is bypassed by the route’s scope validation flaw. Although the likelihood is low, the vulnerability grants unauthorized access to sensitive media resources.
OpenCVE Enrichment
Github GHSA