Impact
OpenClaw versions prior to 2026.2.14 allow attackers to spoof the identity of a Telegram user by using mutable usernames instead of the intended immutable numeric sender IDs. This flaw lets an adversary obtain a username that has been recycled by a legitimate user and use it to pass an allowlist check, thereby interacting with bots as an unauthorized sender. The weakness is an authorization bypass flaw (CWE-290) affecting confidentiality and integrity of bot interactions.
Affected Systems
OpenClaw "OpenClaw" implementations running any Node.js environment that employ Telegram allowlist authorization. The vulnerability affects all versions before 2026.2.14; no specific sub-version details were supplied beyond the major release. Users of older releases are at risk unless they upgrade.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate severity, but the EPSS score of less than 1 % suggests a low probability of exploitation under the current threat landscape. The vulnerability is not listed in the CISA KEV catalog. It is inferred that an attacker could observe or predict the recycling of a username to impersonate an allowed user without any privileged credentials. It is also inferred that the exploit can be performed remotely and without user interaction once the allowlist logic is disclosed.
OpenCVE Enrichment
Github GHSA