CVE-2026-33578

OpenClaw before 2026.3.28 contains a sender policy bypass vulnerability in the Google Chat and Zalouser extensions where route-level group allowlist policies silently downgrade to open policy. Attackers can exploit this policy resolution flaw to bypass sender restrictions and interact with bots despite configured allowlist restrictions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

01 Apr 2026, 19:12

Type Values Removed Values Added
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw
References () https://github.com/openclaw/openclaw/commit/e64a881ae0fb8af18e451163f4c2d611d60cc8e4 - () https://github.com/openclaw/openclaw/commit/e64a881ae0fb8af18e451163f4c2d611d60cc8e4 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-63mg-xp9j-jfcm - () https://github.com/openclaw/openclaw/security/advisories/GHSA-63mg-xp9j-jfcm - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-sender-policy-allowlist-bypass-via-policy-downgrade-in-google-chat-and-zalouser-extensions - () https://www.vulncheck.com/advisories/openclaw-sender-policy-allowlist-bypass-via-policy-downgrade-in-google-chat-and-zalouser-extensions - Third Party Advisory

31 Mar 2026, 18:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 4.3

31 Mar 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 15:16

Updated : 2026-04-01 19:12


NVD link : CVE-2026-33578

Mitre link : CVE-2026-33578

CVE.ORG link : CVE-2026-33578


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-863

Incorrect Authorization