Impact
OpenClaw versions 2026.4.10 through 2026.4.13 do not preserve the group tool policy context when the delivery queue recovers following a media replay operation. This flaw allows an attacker to make use of queues that have already been populated with outbound media. By exploiting this recovered media after a restart or recovery, an attacker can circumvex the intended policy controls, resulting in weakened channel media restrictions and the potential for the attacker to send unfiltered media. The weakness is a classic example of improper authorization (CWE‑862).
Affected Systems
The affected product is OpenClaw, versions 2026.4.10 up to, but not including, 2026.4.14. The severity of the vulnerability is a CVSS score of 6.0, indicating a medium impact with potential for policy bypass. No exploitation probability metric (EPSS) is available, and the vulnerability is not listed in CISA’s KEV catalog.
Risk and Exploitability
Because the attack requires the attacker to have access to the delivery queue and the ability to trigger a service restart or recovery, the attack vector is likely internal or privileged. The lack of EPSS data makes it hard to gauge current threat level, but the medium CVSS score combined with the potential for policy bypass signifies that the risk is moderate to high when the affected versions are in use. Without an automated exploitation mechanism, the vulnerability is less likely to be widely abused but remains actionable for operators with compromised or privileged accounts.
OpenCVE Enrichment