Description
OpenClaw is a personal AI assistant. Prior to version 2026.2.14, under iMessage `groupPolicy=allowlist`, group authorization could be satisfied by sender identities coming from the DM pairing store, broadening DM trust into group contexts. Version 2026.2.14 fixes the issue.
Published: 2026-02-19
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Inherited DM Pairing Store Identities
Action: Patch Immediately
AI Analysis

Impact

OpenClaw’s group authorization system allowed group messages to be trusted based on identities stored in the DM pairing store when the group policy was set to allowlist. This flaw let an attacker who could supply a DM pairing store identity bypass all other group membership checks, thereby gaining membership and access to group messages that the user had not explicitly approved. The weakness arises from insufficient authorization checks, classified as CWE‑284 and CWE‑863. With this capability, an attacker can read, post, or forward messages within the group, compromising confidentiality, integrity, and potentially availability of the group communication.

Affected Systems

The vulnerability affects OpenClaw’s openclaw and clawdbot components on all versions released before 2026.2.14. The fix was deployed in release v2026.2.14; later releases contain the corrected group authorization logic.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity. EPSS is below 1 %, suggesting a low probability of exploitation in the wild, and the issue is not present in CISA’s KEV catalog. It is inferred that exploitation would require the ability to insert or impersonate a DM pairing store identity, which might imply a privileged or compromised local user, limiting the attack surface. Nonetheless, any system where iMessage group communications are used for sensitive exchanges should treat this as a potential attack vector and apply the patch promptly.

Generated by OpenCVE AI on April 18, 2026 at 11:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.2.14 or later to apply the vendor‑supplied fix.
  • If immediate upgrade is not possible, disable the groupPolicy=allowlist setting or enforce stricter group membership verification to prevent unvetted identities from being accepted.
  • Audit the DM pairing store and restrict the creation of new identities to trusted users only, ensuring that compromised or rogue identities cannot be leveraged for group access.

Generated by OpenCVE AI on April 18, 2026 at 11:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-g34w-4xqq-h79m OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities
History

Thu, 26 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

Fri, 20 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Openclaw
Openclaw clawdbot
Openclaw openclaw
Vendors & Products Openclaw
Openclaw clawdbot
Openclaw openclaw

Thu, 19 Feb 2026 23:30:00 +0000

Type Values Removed Values Added
Description OpenClaw is a personal AI assistant. Prior to version 2026.2.14, under iMessage `groupPolicy=allowlist`, group authorization could be satisfied by sender identities coming from the DM pairing store, broadening DM trust into group contexts. Version 2026.2.14 fixes the issue.
Title OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities
Weaknesses CWE-284
CWE-863
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Openclaw Clawdbot Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-20T15:38:50.782Z

Reserved: 2026-02-13T16:27:51.809Z

Link: CVE-2026-26328

cve-icon Vulnrichment

Updated: 2026-02-20T15:27:07.440Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-20T00:16:15.523

Modified: 2026-02-26T18:41:00.350

Link: CVE-2026-26328

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:45:44Z

Weaknesses