Description
OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the Discord moderation action handling (timeout, kick, ban) uses sender identity from request parameters in tool-driven flows, instead of trusted runtime sender context. In setups where Discord moderation actions are enabled and the bot has the necessary guild permissions, a non-admin user can request moderation actions by spoofing sender identity fields. This issue has been fixed in version 2026.2.18.
Published: 2026-02-21
Score: 2.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch
AI Analysis

Impact

The vulnerability stems from the Discord moderation handler in OpenClaw versions 2026.2.17 and earlier. The handler accepts a sender identity supplied in request parameters when processing moderation actions, instead of verifying the sender through the bot’s runtime context. Because of this flaw, a non-admin user can forge these parameters to make the bot perform timeout, kick, or ban actions with the same effect as an authorized moderator. This grants the attacker unauthorized moderation control, which compromises the integrity of the Discord community. The weakness is classed as CWE‑862, Authentication Failure.

Affected Systems

This issue affects the OpenClaw AI assistant, distributed under the vendor name OpenClaw by OpenClaw. All installations running version 2026.2.17 or older are vulnerable. The product is built on a Node.js runtime, and the affected component is the Discord moderation action handling module.

Risk and Exploitability

The CVSS base score is 2.3, indicating a low severity impact on confidentiality, integrity, and availability. EPSS is less than 1 %, meaning the probability of exploitation is very low, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Attackers can exploit the flaw by sending crafted requests to the bot’s endpoint while possessing a Discord account that can initiate tool-driven flows. The exploit requires the bot to have moderation permissions within the guild, but it does not require any escalated privileges on the host system, so the risk is bounded to the Discord server’s control. Nevertheless, organizations that expose the bot to untrusted users should patch promptly to eliminate the possibility of abuse.

Generated by OpenCVE AI on April 17, 2026 at 16:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.2.18 or later
  • Limit the bot’s guild permissions to only those necessary for moderation and ensure that only authorized administrators can trigger tool-driven moderation flows
  • Enable monitoring and logging of all moderation actions to detect and investigate suspicious activity

Generated by OpenCVE AI on April 17, 2026 at 16:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-wh94-p5m6-mr7j OpenClaw Discord moderation authorization used untrusted sender identity in tool-driven flows
History

Wed, 25 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Openclaw
Openclaw openclaw
Vendors & Products Openclaw
Openclaw openclaw

Sat, 21 Feb 2026 09:30:00 +0000

Type Values Removed Values Added
Description OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, the Discord moderation action handling (timeout, kick, ban) uses sender identity from request parameters in tool-driven flows, instead of trusted runtime sender context. In setups where Discord moderation actions are enabled and the bot has the necessary guild permissions, a non-admin user can request moderation actions by spoofing sender identity fields. This issue has been fixed in version 2026.2.18.
Title OpenClaw Discord moderation authorization used untrusted sender identity in tool-driven flows
Weaknesses CWE-862
References
Metrics cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-24T18:14:56.099Z

Reserved: 2026-02-19T19:46:03.541Z

Link: CVE-2026-27484

cve-icon Vulnrichment

Updated: 2026-02-24T18:14:48.074Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-21T10:16:12.557

Modified: 2026-02-23T20:44:09.190

Link: CVE-2026-27484

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T17:00:10Z

Weaknesses