CVE-2026-35654

OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Microsoft Teams feedback invokes that allows unauthorized senders to record session feedback. Attackers can bypass sender allowlist checks via feedback invoke endpoints to trigger unauthorized feedback recording or reflection.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

13 Apr 2026, 21:06

Type Values Removed Values Added
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
References () https://github.com/openclaw/openclaw/commit/c5415a474bb085404c20f8b312e436997977b1ea - () https://github.com/openclaw/openclaw/commit/c5415a474bb085404c20f8b312e436997977b1ea - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-rf6h-5gpw-qrgq - () https://github.com/openclaw/openclaw/security/advisories/GHSA-rf6h-5gpw-qrgq - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-authorization-bypass-in-microsoft-teams-feedback-invoke - () https://www.vulncheck.com/advisories/openclaw-authorization-bypass-in-microsoft-teams-feedback-invoke - Third Party Advisory
First Time Openclaw openclaw
Openclaw

10 Apr 2026, 17:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-10 17:17

Updated : 2026-04-13 21:06


NVD link : CVE-2026-35654

Mitre link : CVE-2026-35654

CVE.ORG link : CVE-2026-35654


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel