CVE-2026-42424: OpenClaw: Shared reply MEDIA - paths are treated as trusted and can trigger cross-channel local file exfiltration
(updated )
Shared reply MEDIA: paths are treated as trusted and can trigger cross-channel local file exfiltration.
A crafted shared reply MEDIA reference could cause another channel to read a local file path as trusted generated media.
OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary.
References
- github.com/advisories/GHSA-qqq7-4hxc-x63c
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/d7c3210cd6f5fdfdc1beff4c9541673e814354d5
- github.com/openclaw/openclaw/security/advisories/GHSA-qqq7-4hxc-x63c
- nvd.nist.gov/vuln/detail/CVE-2026-42424
- www.vulncheck.com/advisories/openclaw-local-file-exfiltration-via-shared-reply-media-paths
Code Behaviors & Features
Detect and mitigate CVE-2026-42424 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →