GHSA-qc5j-2mqx-x83q: Duplicate Advisory: OpenClaw: Webchat media embedding enforces local-root containment for tool-result files
(updated )
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-mr34-9552-qr95. This link is maintained to preserve external references.
Original Description
OpenClaw versions 2026.4.7 before 2026.4.15 fail to enforce local-root containment on tool-result media paths, allowing arbitrary local and UNC file access. Attackers can craft malicious tool-result media references to trigger host-side file reads or Windows network path access, potentially disclosing sensitive files or exposing credentials.
References
- github.com/advisories/GHSA-qc5j-2mqx-x83q
- github.com/openclaw/openclaw/commit/1470de5d3e0970856d86cd99336bb8ada3fe87da
- github.com/openclaw/openclaw/commit/52ef42302ead9e183e6c8810e0a04ee4ef8ae9fc
- github.com/openclaw/openclaw/commit/6e58f1f9f54bca1fea1268ec0ee4c01a2af03dde
- github.com/openclaw/openclaw/security/advisories/GHSA-mr34-9552-qr95
- nvd.nist.gov/vuln/detail/CVE-2026-41389
- www.vulncheck.com/advisories/openclaw-arbitrary-file-read-via-unvalidated-tool-result-media-paths
Code Behaviors & Features
Detect and mitigate GHSA-qc5j-2mqx-x83q with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →