


Perceptive Security
SOC/SIEM Consultancy

OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended auth…
Published:
30 maart 2026 om 22:00:00
Alert date:
31 maart 2026 om 13:04:59
Source:
nvd.nist.gov
Email & Messaging, Identity & Access
OpenClaw versions before 2026.3.8 contain a sender allowlist bypass vulnerability in the Microsoft Teams plugin. The vulnerability occurs when a team/channel route allowlist is configured with an empty groupAllowFrom parameter, causing the message handler to synthesize wildcard sender authorization. This allows any sender in the matched team/channel to bypass intended authorization checks and trigger replies in allowlisted Teams routes. The vulnerability enables unauthorized senders to perform actions they should not have access to within the Teams integration.
Technical details
Mitigation steps:
Affected products:
OpenClaw
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-34509
https://github.com/openclaw/openclaw/commit/88aee9161e0e6d32e810a25711e32a808a1777b2
https://github.com/openclaw/openclaw/security/advisories/GHSA-g7cr-9h7q-4qxq
https://www.vulncheck.com/advisories/openclaw-sender-allowlist-bypass-in-microsoft-teams-plugin-via-route-allowlist-configuration-2
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
