CVE-2026-35647

OpenClaw before 2026.3.25 contains an access control vulnerability where verification notices bypass DM policy checks and reply to unpaired peers. Attackers can send verification notices to users outside allowed direct message policies by exploiting insufficient access validation before message transmission.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

13 Apr 2026, 20:45

Type Values Removed Values Added
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw
References () https://github.com/openclaw/openclaw/commit/2383daf5c4a4e08d9553e0e949552ad755ef9ec2 - () https://github.com/openclaw/openclaw/commit/2383daf5c4a4e08d9553e0e949552ad755ef9ec2 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-9wqx-g2cw-vc7r - () https://github.com/openclaw/openclaw/security/advisories/GHSA-9wqx-g2cw-vc7r - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-direct-message-policy-bypass-via-verification-notices - () https://www.vulncheck.com/advisories/openclaw-direct-message-policy-bypass-via-verification-notices - Third Party Advisory

10 Apr 2026, 17:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-10 17:17

Updated : 2026-04-13 20:45


NVD link : CVE-2026-35647

Mitre link : CVE-2026-35647

CVE.ORG link : CVE-2026-35647


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel