top of page
perceptive_background_267k.jpg

OpenClaw before 2026.3.12 contains an authorization bypass vulnerability where Feishu reaction events with omitted chat_type are misclassified as p2p conversati…

Published:

28 maart 2026 om 23:00:00

Alert date:

29 maart 2026 om 14:05:43

Source:

nvd.nist.gov

Click to open the original link from this advisory

Identity & Access, Email & Messaging

OpenClaw versions before 2026.3.12 contain an authorization bypass vulnerability affecting Feishu reaction events. The vulnerability occurs when chat_type parameters are omitted, causing the system to misclassify group chat events as peer-to-peer conversations. This misclassification allows attackers to bypass critical security protections including groupAllowFrom and requireMention controls in group chat environments. The vulnerability specifically impacts reaction-derived events within the Feishu messaging platform integration. Organizations using affected OpenClaw versions should upgrade immediately to prevent unauthorized access to group chat functionalities.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page