OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Microsoft Teams feedback invokes that allows unauthorized senders to record session feedback. Attackers can bypass sender allowlist checks via feedback invoke endpoints to trigger unauthorized feedback recording or reflection.
References
Configurations
History
13 Apr 2026, 21:06
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/openclaw/openclaw/commit/c5415a474bb085404c20f8b312e436997977b1ea - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-rf6h-5gpw-qrgq - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-authorization-bypass-in-microsoft-teams-feedback-invoke - Third Party Advisory | |
| First Time |
Openclaw openclaw
Openclaw |
10 Apr 2026, 17:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-10 17:17
Updated : 2026-04-13 21:06
NVD link : CVE-2026-35654
Mitre link : CVE-2026-35654
CVE.ORG link : CVE-2026-35654
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel
