The vulnerability is a path traversal issue in OpenClaw's message tool. The root cause lies in the normalizeSandboxMediaParams function, which was designed to restrict file access to a specific sandbox directory. However, this function failed to validate the mediaUrl and fileUrl parameter aliases, checking only the media, path, and filePath parameters.
An attacker could exploit this by crafting a request that uses mediaUrl or fileUrl with a file:// URI to point to an arbitrary file on the local filesystem (e.g., file:///etc/passwd). The normalizeSandboxMediaParams function would not apply its sandbox validation to this parameter, allowing the unsanitized path to be processed by downstream functions like handleSendAction.
The patch addresses this by expanding the list of parameters that normalizeSandboxMediaParams validates to include mediaUrl and fileUrl. This ensures that any local file paths provided through these aliases are correctly resolved against the sandbox root, preventing the traversal. The identified functions are all part of this vulnerable workflow, with normalizeSandboxMediaParams being the source of the flaw and runMessageAction and handleSendAction being key functions in the execution path that would appear in a runtime profile during exploitation.