Impact
OpenClaw versions prior to 2026.4.10 fail to normalize Discord event cover image parameters during media sandboxing. Attackers can inject host-relative or local media references into channel action paths that expect sanitized media. This flaw can allow the application to access files on the host filesystem that are outside the intended media directory, potentially revealing sensitive data or executing unintended code. The weakness is identified as CWE‑184.
Affected Systems
The affected product is OpenClaw, specifically all 2026.4.7, 2026.4.8, and 2026.4.9 releases. The issue applies to installations that have not been upgraded to 2026.4.10 or newer. The CPE listing for the product is cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*.
Risk and Exploitability
The CVSS base score of 4.9 indicates moderate severity. Because no EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, the likelihood of exploitation is uncertain, but an attacker can create or influence a Discord event with a malicious cover image URL to trigger the bypass. The flaw is exploitable by anyone who can control the event, potentially leading to arbitrary file disclosure on the host running OpenClaw.
OpenCVE Enrichment
Github GHSA