OpenClaw before 2026.3.28 downloads and stores inbound media from Zalo channels before validating sender authorization. Unauthorized senders can force network fetches and disk writes to the media store by sending messages that are subsequently rejected.
References
Configurations
History
01 Apr 2026, 19:19
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/openclaw/openclaw/commit/68ceaf7a5f64a23e78b95eff055e4b497218312a - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-v2v2-f783-358j - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-unauthorized-media-download-via-zalo-channel - Third Party Advisory | |
| First Time |
Openclaw openclaw
Openclaw |
31 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
31 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-31 15:16
Updated : 2026-04-01 19:19
NVD link : CVE-2026-33576
Mitre link : CVE-2026-33576
CVE.ORG link : CVE-2026-33576
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-863
Incorrect Authorization
