Impact
OpenClaw versions 2026.1.30 and earlier contain an information disclosure vulnerability in the optional MS Teams attachment downloader. When the application receives 401 or 403 responses and retries the download, the downloader sends stored Authorization bearer tokens to any host that matches a permissive suffix‑based allowlist. This allows an attacker to steal bearer tokens intended for trusted Microsoft Teams domains. The vulnerability does not compromise system integrity or availability but permits unauthorized access to token‑authenticated services.
Affected Systems
The affected product is OpenClaw, specifically releases 2026.1.30 and older, when the optional MS Teams attachment downloader extension is enabled. The risk applies to any installation running these versions on a platform that uses node.js, where users have configured a suffix‑based allowlist for permitted download hosts.
Risk and Exploitability
The CVSS score of 5.9 indicates moderate severity, while the EPSS score of less than 1% shows a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the application to be configured with the optional extension and to have a permissive suffix allowlist; an attacker may trigger the retry logic by causing the application to reattempt a download to a malicious or compromised host matching the suffix rule.
OpenCVE Enrichment
Github GHSA