Sandbox media local-path validation accepted absolute paths under host tmp, even when those paths were outside the active sandbox root.
openclaw (npm)2026.2.23<= 2026.2.23>= 2026.2.24In affected versions, sandbox media path resolution allowed absolute host tmp paths as trusted media inputs when they were under os.tmpdir(), without requiring that the path stay within the active sandboxRoot.
Because outbound attachment hydration consumed these paths as already validated, this enabled out-of-sandbox host tmp file reads and exfiltration through attachment delivery.
sandboxRoot as a strict local filesystem boundary.d3da67c7a9b463edc1a9b1c1f7af107a34ca32f579a7b3d22ef92e36a4031093d80a0acb0d82f351def993dbd843ff28f2b3bad5cc24603874ba9f1eThe advisory is pre-set with patched version 2026.2.24 so it is ready for publication once that npm release is available.
OpenClaw thanks @tdjackey for reporting.
openclaw@2026.2.24 is published on npm and contains the fix commit(s) listed above. This advisory now marks >= 2026.2.24 as patched.
{
"github_reviewed": true,
"github_reviewed_at": "2026-03-03T18:11:16Z",
"severity": "MODERATE",
"nvd_published_at": "2026-03-19T22:16:37Z",
"cwe_ids": [
"CWE-22",
"CWE-284"
]
}