#VU125232 Improper access control in OpenClaw - CVE-2026-33581

 

#VU125232 Improper access control in OpenClaw - CVE-2026-33581

Published: April 8, 2026


Vulnerability identifier: #VU125232
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-33581
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
OpenClaw
Software vendor:
OpenClaw

Description

The vulnerability allows a remote user to disclose sensitive information.

The vulnerability exists due to improper access control in src/infra/outbound/message-action-params.ts and src/infra/outbound/message-action-runner.ts when handling mediaUrl and fileUrl alias parameters. A remote user can supply crafted alias parameters to disclose sensitive information.

Exploitation requires the caller to be constrained to sandbox media roots.


Remediation

Install security update from vendor's website.

External links