OpenClaw before 2026.3.25 contains an access control vulnerability where verification notices bypass DM policy checks and reply to unpaired peers. Attackers can send verification notices to users outside allowed direct message policies by exploiting insufficient access validation before message transmission.
References
Configurations
History
13 Apr 2026, 20:45
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
|
| References | () https://github.com/openclaw/openclaw/commit/2383daf5c4a4e08d9553e0e949552ad755ef9ec2 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-9wqx-g2cw-vc7r - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-direct-message-policy-bypass-via-verification-notices - Third Party Advisory |
10 Apr 2026, 17:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-10 17:17
Updated : 2026-04-13 20:45
NVD link : CVE-2026-35647
Mitre link : CVE-2026-35647
CVE.ORG link : CVE-2026-35647
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel
