GHSA-v8wv-jg3q-qwpq

Suggest an improvement
Source
https://github.com/advisories/GHSA-v8wv-jg3q-qwpq
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-v8wv-jg3q-qwpq/GHSA-v8wv-jg3q-qwpq.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-v8wv-jg3q-qwpq
Aliases
  • CVE-2026-33581
Downstream
Published
2026-03-31T23:54:28Z
Modified
2026-04-06T17:57:35.035381Z
Severity
  • 6.2 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • 7.1 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
OpenClaw's message tool media parameter bypasses tool policy filesystem isolation
Details

Summary

The message tool accepted mediaUrl and fileUrl aliases without applying the same sandbox localRoots validation as the canonical media path handling.

Impact

A caller constrained to sandbox media roots could read arbitrary local files by routing them through the alias parameters.

Affected Component

src/infra/outbound/message-action-params.ts, src/infra/outbound/message-action-runner.ts

Fixed Versions

  • Affected: < 2026.3.24
  • Patched: >= 2026.3.24
  • Latest stable 2026.3.28 contains the fix.

Fix

Fixed by commit 1d7cb6fc03 (fix: close sandbox media root bypass for mediaUrl/fileUrl aliases).

OpenClaw thanks @AntAISecurityLab for reporting.

Database specific
{
    "nvd_published_at": null,
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-22"
    ],
    "github_reviewed_at": "2026-03-31T23:54:28Z"
}
References

Affected packages

npm / openclaw

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2026.3.24

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-v8wv-jg3q-qwpq/GHSA-v8wv-jg3q-qwpq.json"