OpenClaw before 2026.3.25 contains an authentication bypass vulnerability in raw card send surface that allows unpaired recipients to mint legacy callback payloads. Attackers can send raw card commands to bypass DM pairing restrictions and reach callback handling without proper authorization.
References
Configurations
History
13 Apr 2026, 20:39
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/commit/81c45976db532324b5a0918a70decc19520dc354 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-77w2-crqv-cmv3 - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-dm-pairing-bypass-via-legacy-card-callbacks - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
10 Apr 2026, 17:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-10 17:17
Updated : 2026-04-13 20:39
NVD link : CVE-2026-35664
Mitre link : CVE-2026-35664
CVE.ORG link : CVE-2026-35664
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel
