Description
OpenClaw versions prior to 2026.2.14 contain a privilege escalation vulnerability in the Slack slash-command handler that incorrectly authorizes any direct message sender when dmPolicy is set to open (must be configured). Attackers can execute privileged slash commands via direct message to bypass allowlist and access-group restrictions.
Published: 2026-03-05
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Slack Direct Messages
Action: Immediate Patch
AI Analysis

Impact

OpenClaw versions earlier than 2026.2.14 are vulnerable because the Slack slash-command handler mistakenly allows any direct-message sender to execute privileged commands when dmPolicy is open. This flaw lets an attacker send a crafted message to a privileged Slack bot and bypass the slash-command allowlist and access-group restrictions, effectively granting the attacker the same level of control as the bot owner and compromising application integrity and potentially data confidentiality.

Affected Systems

This vulnerability affects all installations of OpenClaw running any version prior to 2026.2.14, regardless of deployment environment. The issue resides in the core Slack integration component tied to the dmPolicy configuration, so any user who can send direct messages to the bot with dmPolicy set to open is exposed.

Risk and Exploitability

The CVSS score of 8.2 indicates high risk, but an EPSS score below 1% suggests a low likelihood of automated exploitation at present. The flaw is not listed in the CISA KEV catalog, implying no widespread active exploitation. Attackers would need access to a Slack workspace with a bot configured for OpenClaw and actively send direct messages to invoke privileged commands; the flaw is exploitable only within Slack and requires no remote code execution.

Generated by OpenCVE AI on April 16, 2026 at 12:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OpenClaw to version 2026.2.14 or newer.
  • If an update is not immediately possible, reconfigure the Slack integration to set dmPolicy to closed or disable direct messages for privileged commands.
  • Review and tighten slash-command allowlists and access-group settings to limit privileged command execution to trusted users only.

Generated by OpenCVE AI on April 16, 2026 at 12:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-v773-r54f-q32w OpenClaw Slack: dmPolicy=open allowed any DM sender to run privileged slash commands
History

Tue, 10 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-863
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-863

Fri, 06 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Thu, 05 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.2.14 contain a privilege escalation vulnerability in the Slack slash-command handler that incorrectly authorizes any direct message sender when dmPolicy is set to open (must be configured). Attackers can execute privileged slash commands via direct message to bypass allowlist and access-group restrictions.
Title OpenClaw < 2026.2.14 - Privilege Escalation in Slack Slash Command Handler via Direct Messages
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-863
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-10T14:43:57.776Z

Reserved: 2026-02-27T15:13:08.195Z

Link: CVE-2026-28392

cve-icon Vulnrichment

Updated: 2026-03-10T14:43:51.838Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T22:16:15.567

Modified: 2026-03-10T20:10:19.663

Link: CVE-2026-28392

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:15:35Z

Weaknesses