Impact
OpenClaw versions 2026.4.9 and earlier contain a sender policy bypass in the outbound host-media attachment read helper. The flaw allows an actor with read restrictions (such as toolsBySender or group policy denied access) to trigger host-media attachment loading, bypassing sender and group‑scoped permissions and reading local files from the outbound media path.
Affected Systems
The vulnerability affects the OpenClaw product from the OpenClaw vendor. Any installation of OpenClaw 2026.4.9 or earlier is susceptible; upgrading to 2026.4.10 or later removes the flaw.
Risk and Exploitability
The CVSS score of 4.9 indicates a moderate security impact. No EPSS score is available, and the vulnerability is not listed in CISA's KEV catalog, suggesting limited or no exploitation evidence to date. The likely attack vector is a local compromise, where a user with restricted file permissions can exploit the bypass to read files that should be protected by sender or group policy. Mitigation through an official patch is strongly recommended due to the potential for sensitive data disclosure.
OpenCVE Enrichment
Github GHSA