OpenClaw before 2026.3.31 contains an authorization bypass vulnerability in Discord slash command and autocomplete paths that fail to enforce group DM channel allowlist restrictions. Authorized Discord users can bypass channel restrictions by invoking slash commands, allowing access to restricted group DM channels.
References
Configurations
History
29 Apr 2026, 14:41
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Openclaw openclaw
Openclaw |
|
| References | () https://github.com/openclaw/openclaw/commit/8fdb19676ab44cf85d47ee13c578195f2e527591 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-rvvf-6vh3-9j43 - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-group-dm-channel-allowlist-bypass-via-discord-slash-commands - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
23 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-23 22:16
Updated : 2026-04-29 14:41
NVD link : CVE-2026-41348
Mitre link : CVE-2026-41348
CVE.ORG link : CVE-2026-41348
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-863
Incorrect Authorization
