OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension
Description
Published to the GitHub Advisory Database
Feb 17, 2026
Reviewed
Feb 17, 2026
Published by the National Vulnerability Database
Feb 19, 2026
Last updated
Feb 20, 2026
Summary
The Feishu extension previously allowed
sendMediaFeishuto treat attacker-controlledmediaUrlvalues as local filesystem paths and read them directly.Affected versions
< 2026.2.14Patched versions
>= 2026.2.14Impact
If an attacker can influence tool calls (directly or via prompt injection), they may be able to exfiltrate local files by supplying paths such as
/etc/passwdasmediaUrl.Remediation
Upgrade to OpenClaw
2026.2.14or newer.Notes
The fix removes direct local file reads from this path and routes media loading through hardened helpers that enforce local-root restrictions.
Fix commit 5b4121d60 confirmed on main and in v2026.2.14. Upgrade to
openclaw >= 2026.2.14.References