top of page
perceptive_background_267k.jpg

OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended auth…

Published:

30 maart 2026 om 22:00:00

Alert date:

31 maart 2026 om 13:04:59

Source:

nvd.nist.gov

Click to open the original link from this advisory

Email & Messaging, Identity & Access

OpenClaw versions before 2026.3.8 contain a sender allowlist bypass vulnerability in the Microsoft Teams plugin. The vulnerability occurs when a team/channel route allowlist is configured with an empty groupAllowFrom parameter, causing the message handler to synthesize wildcard sender authorization. This allows any sender in the matched team/channel to bypass intended authorization checks and trigger replies in allowlisted Teams routes. The vulnerability enables unauthorized senders to perform actions they should not have access to within the Teams integration.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page