Impact
OpenClaw 2026.1.29 and earlier versions of the Twitch plugin fail to enforce the allowFrom allowlist when the allowedRoles configuration is missing or empty. This oversight allows any Twitch user who can mention the bot in chat to trigger the agent dispatch pipeline. The resulting unauthorized action may execute unintended commands or place excessive load on system resources, effectively enabling remote exploitation without requiring privileged credentials. The weakness is classified as CWE‑285, indicating an authorization bypass.
Affected Systems
Systems running OpenClaw with the Twitch plugin enabled, specifically versions prior to 2026.2.1. The vulnerability is present only when the plugin is installed and active, and no allowRoles setting is defined, exposing the platform to unauthorized Twitch accounts.
Risk and Exploitability
The advisory lists a CVSS score of 6.3, indicating a moderate severity. EPSS indicates exploitation probability is below 1%, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw remotely by simply mentioning the bot in Twitch chat, as no additional privileges or network access are required. The low exploitation probability suggests that while the vulnerability exists, it may not be widely weaponized, yet it remains actionable for any adversary with a Twitch account.
OpenCVE Enrichment
Github GHSA