Untriaged
Permalink
CVE-2026-32895
5.4 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
OpenClaw < 2026.2.26 - Sender Authorization Bypass in Slack System Event Handlers
OpenClaw versions prior to 2026.2.26 fail to enforce sender authorization in member and message subtype system event handlers, allowing unauthorized events to be enqueued. Attackers can bypass Slack DM allowlists and per-channel user allowlists by sending system events from non-allowlisted senders through message_changed, message_deleted, and thread_broadcast events.
References
-
GitHub Security Advisory (GHSA-v8cg-4474-49v8) third-party-advisory
-
Patch Commit patch
Affected products
OpenClaw
- <2026.2.26
- ==2026.2.26
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>