


Perceptive Security
SOC/SIEM Consultancy

OpenClaw before 2026.3.12 contains an authorization bypass vulnerability where Feishu reaction events with omitted chat_type are misclassified as p2p conversatiā¦
Published:
28 maart 2026 om 23:00:00
Alert date:
29 maart 2026 om 14:05:43
Source:
nvd.nist.gov
Identity & Access, Email & Messaging
OpenClaw versions before 2026.3.12 contain an authorization bypass vulnerability affecting Feishu reaction events. The vulnerability occurs when chat_type parameters are omitted, causing the system to misclassify group chat events as peer-to-peer conversations. This misclassification allows attackers to bypass critical security protections including groupAllowFrom and requireMention controls in group chat environments. The vulnerability specifically impacts reaction-derived events within the Feishu messaging platform integration. Organizations using affected OpenClaw versions should upgrade immediately to prevent unauthorized access to group chat functionalities.
Technical details
Mitigation steps:
Affected products:
OpenClaw
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-32924
https://github.com/openclaw/openclaw/security/advisories/GHSA-m69h-jm2f-2pv8
https://www.vulncheck.com/advisories/openclaw-authorization-bypass-via-misclassified-reaction-events-in-feishu
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
