OpenClaw versions 2026.4.10 before 2026.4.14 fail to persist session context during delivery queue recovery for media replay. Attackers can exploit recovered queued outbound media to bypass group tool policy enforcement and weaken channel media restrictions after service restart or recovery.
https://github.com/openclaw/openclaw/security/advisories/GHSA-r77c-2cmr-7p47
https://github.com/openclaw/openclaw/commit/48aae82bbc19ba8b0741e61a08063eb0d1df464e
Published: 2026-05-06
Updated: 2026-05-06
Base Score: 4.9
Vector: CVSS2#AV:N/AC:H/Au:S/C:N/I:C/A:N
Severity: Medium
Base Score: 5.3
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
Severity: Medium
Base Score: 6
Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Severity: Medium