


Perceptive Security
SOC/SIEM Consultancy

OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended auth…
Published:
30 March 2026 at 22:00:00
Alert date:
31 March 2026 at 13:04:59
Source:
nvd.nist.gov
Enterprise Applications, Email & Messaging
OpenClaw versions before 2026.3.8 contain a sender allowlist bypass vulnerability in the Microsoft Teams plugin. The vulnerability occurs when a team/channel route allowlist is configured with an empty groupAllowFrom parameter. This configuration causes the message handler to synthesize wildcard sender authorization, allowing any sender in the matched team/channel to bypass intended authorization checks. Unauthorized senders can trigger replies in allowlisted Teams routes, potentially compromising the security controls designed to restrict message handling to authorized users only.
Technical details
Mitigation steps:
Affected products:
OpenClaw
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-34506
https://github.com/openclaw/openclaw/commit/88aee9161e0e6d32e810a25711e32a808a1777b2
https://github.com/openclaw/openclaw/security/advisories/GHSA-g7cr-9h7q-4qxq
https://www.vulncheck.com/advisories/openclaw-sender-allowlist-bypass-in-microsoft-teams-plugin-via-route-allowlist-configuration
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
