Untriaged
Permalink
CVE-2026-33578
4.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): NONE
- Availability impact (A): NONE
OpenClaw < 2026.3.28 - Sender Policy Allowlist Bypass via Policy Downgrade in Google Chat and Zalouser Extensions
OpenClaw before 2026.3.28 contains a sender policy bypass vulnerability in the Google Chat and Zalouser extensions where route-level group allowlist policies silently downgrade to open policy. Attackers can exploit this policy resolution flaw to bypass sender restrictions and interact with bots despite configured allowlist restrictions.
References
-
GitHub Security Advisory (GHSA-63mg-xp9j-jfcm) third-party-advisory
-
Patch Commit patch
Affected products
OpenClaw
- ==2026.3.28
- <2026.3.28
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>