top of page
perceptive_background_267k.jpg

OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended auth…

Published:

30 maart 2026 om 22:00:00

Alert date:

31 maart 2026 om 13:04:59

Source:

nvd.nist.gov

Click to open the original link from this advisory

Enterprise Applications, Email & Messaging

OpenClaw versions before 2026.3.8 contain a sender allowlist bypass vulnerability in the Microsoft Teams plugin. The vulnerability occurs when a team/channel route allowlist is configured with an empty groupAllowFrom parameter. This configuration causes the message handler to synthesize wildcard sender authorization, allowing any sender in the matched team/channel to bypass intended authorization checks. Unauthorized senders can trigger replies in allowlisted Teams routes, potentially compromising the security controls designed to restrict message handling to authorized users only.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page