OpenClaw before 2026.4.2 fails to filter Slack thread context by sender allowlist, allowing non-allowlisted messages to enter agent context. Attackers can inject unauthorized thread messages through allowlisted user replies to bypass sender access controls and manipulate model context.
References
Configurations
History
01 May 2026, 20:23
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/commit/ac5bc4fb37becc64a2ec314864cca1565e921f2d - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-qm77-8qjp-4vcm - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-sender-allowlist-bypass-via-slack-thread-context - Third Party Advisory | |
| First Time |
Openclaw openclaw
Openclaw |
|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
23 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-23 22:16
Updated : 2026-05-01 20:23
NVD link : CVE-2026-41358
Mitre link : CVE-2026-41358
CVE.ORG link : CVE-2026-41358
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-346
Origin Validation Error
