When iMessage remote attachment fetching is enabled (channels.imessage.remoteHost), stageSandboxMedia accepted arbitrary absolute paths and used SCP to copy them into local staging.
If a non-attachment path reaches this flow, files outside expected iMessage attachment directories on the remote host can be staged.
openclaw2026.2.17 (latest npm version as of February 19, 2026)Confidentiality impact. An attacker who can influence inbound attachment path metadata may disclose files readable by the OpenClaw process on the configured remote host.
channels.imessage.includeAttachments=true), andchannels.imessage.remoteHost configured or auto-detected), andGiven these preconditions, this advisory is assessed as medium severity.
1316e5740382926e45a42097b4bfe0aef7d63e8epatched_versions should be set to the next released npm version that includes remote attachment path validation, then the advisory can be published.
OpenClaw thanks @zpbrent for reporting.
{
"github_reviewed": true,
"github_reviewed_at": "2026-03-03T19:58:32Z",
"severity": "HIGH",
"nvd_published_at": "2026-03-19T22:16:38Z",
"cwe_ids": [
"CWE-22"
]
}