CVE-2026-35664

OpenClaw before 2026.3.25 contains an authentication bypass vulnerability in raw card send surface that allows unpaired recipients to mint legacy callback payloads. Attackers can send raw card commands to bypass DM pairing restrictions and reach callback handling without proper authorization.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

13 Apr 2026, 20:39

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/commit/81c45976db532324b5a0918a70decc19520dc354 - () https://github.com/openclaw/openclaw/commit/81c45976db532324b5a0918a70decc19520dc354 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-77w2-crqv-cmv3 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-77w2-crqv-cmv3 - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-dm-pairing-bypass-via-legacy-card-callbacks - () https://www.vulncheck.com/advisories/openclaw-dm-pairing-bypass-via-legacy-card-callbacks - Third Party Advisory
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw

10 Apr 2026, 17:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-10 17:17

Updated : 2026-04-13 20:39


NVD link : CVE-2026-35664

Mitre link : CVE-2026-35664

CVE.ORG link : CVE-2026-35664


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel