Impact
The vulnerability is an access control bypass in OpenClaw versions prior to 2026.2.22 that use the optional BlueBubbles plugin. The flaw allows an attacker to exploit an empty allowFrom configuration, causing the dmPolicy pairing and allowlist validation to be bypassed. As a result, remote attackers can send direct messages to BlueBubbles accounts that they should not be able to access, leading to unauthorized disclosure or spoofing of private communications. The weakness is a classic Access Control failure (CWE‑863).
Affected Systems
Affected systems are OpenClaw installations that include the optional BlueBubbles plugin and are running any version earlier than 2026.2.22. The vulnerability does not affect systems that have upgraded to 2026.2.22 or later, or that do not use the BlueBubbles plugin.
Risk and Exploitability
The CVSS score for this vulnerability is 6.3, indicating a moderate severity. The exploit probability is not available from the EPSS data. The vulnerability is not listed in the CISA KEV catalog. Attackers require remote access to the BlueBubbles service and the ability to craft messages that bypass the allowlist checks; the flaw can be exploited without any privileged credentials, making it likely to be used in remote attacks targeting users of the plugin.
OpenCVE Enrichment
Github GHSA