CVE-2026-32924

OpenClaw before 2026.3.12 contains an authorization bypass vulnerability where Feishu reaction events with omitted chat_type are misclassified as p2p conversations instead of group chats. Attackers can exploit this misclassification to bypass groupAllowFrom and requireMention protections in group chat reaction-derived events.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

31 Mar 2026, 17:57

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-m69h-jm2f-2pv8 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-m69h-jm2f-2pv8 - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-authorization-bypass-via-misclassified-reaction-events-in-feishu - () https://www.vulncheck.com/advisories/openclaw-authorization-bypass-via-misclassified-reaction-events-in-feishu - Third Party Advisory
First Time Openclaw openclaw
Openclaw
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

29 Mar 2026, 13:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-29 13:17

Updated : 2026-03-31 17:57


NVD link : CVE-2026-32924

Mitre link : CVE-2026-32924

CVE.ORG link : CVE-2026-32924


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-863

Incorrect Authorization